Today s outline. CSE 127 Computer Security. NAT, Firewalls IDS DDoS. Basic Firewall Concept. TCP/IP Protocol Stack. Packet Filtering.



Similar documents
Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewall Firewall August, 2003

CS5008: Internet Computing

Chapter 8 Security Pt 2

Firewalls and Intrusion Detection

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

1. Firewall Configuration

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Linux Network Security

CS 356 Lecture 16 Denial of Service. Spring 2013

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Cryptography and network security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Chapter 11 Cloud Application Development

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

How To Understand A Network Attack

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Chapter 8 Network Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Networks: IP and TCP. Internet Protocol

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Security: Attack and Defense

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Development of a Network Intrusion Detection System

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

A S B

Firewall Defaults and Some Basic Rules

Seminar Computer Security

DDoS Protection Technology White Paper

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CMPT 471 Networking II

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Linux MDS Firewall Supplement

Network and Services Discovery

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

INTRODUCTION TO FIREWALL SECURITY

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

FIREWALL AND NAT Lecture 7a

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls. Chapter 3

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Networking Test 4 Study Guide

Payment Card Industry (PCI) Executive Report. Pukka Software

Linux Routers and Community Networks

Introduction of Intrusion Detection Systems

Chapter 4 Firewall Protection and Content Filtering

Perimeter and Internal Defenses. Network Defense Tools: Firewalls, Traffic shapers, and Intrusion Detection. This lecture. Basic Firewall Concept

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Firewalls. Chien-Chung Shen

Topics NS HS12 2 CINS/F1-01

Chapter 6: Network Access Control

SECURING APACHE : DOS & DDOS ATTACKS - II

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

Secure Software Programming and Vulnerability Analysis

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Computer Security: Principles and Practice

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Linux MPS Firewall Supplement

LESSON Networking Fundamentals. Understand TCP/IP

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

How do I get to

Firewalls, Tunnels, and Network Intrusion Detection

Barracuda Intrusion Detection and Prevention System

Implementing Secure Converged Wide Area Networks (ISCW)

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Network Security. Chapter 13. Internet Firewalls. Network Security (WS 07/08): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Attack and Defense Techniques

Internet Security Firewalls

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Компјутерски Мрежи NAT & ICMP

Solution of Exercise Sheet 5

Payment Card Industry (PCI) Executive Report 08/04/2014

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Firewalls, IDS and IPS

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Computer Security DD2395

Transcription:

CSE 127 Computer Security Fall 2011 More on network security Todays outline NAT, Firewalls IDS DDoS Chris Kanich (standing in for Hovav) [some slides courtesy Dan Boneh & John Mitchell] TCP/IP Protocol Stack Basic Firewall Concept Application Application protocol (e.g. HTTP) Application Separate local area net from internet Transport TCP protocol Transport Firewall IP protocol IP IP protocol Local network Internet Data Access Data Router All packets between LAN and internet routed through firewall Firewall goals Packet Filtering Prevent malicious attacks on hosts Port scan, syn flooding, Worm propagation» Exploit buffer overflow in program listening on network Provide defense in depth Defend everywhere Programs contain bugs and are vulnerable to attack protocols may contain;» Design weaknesses (SSH CRC)» Implementation flaws (SSL, NTP, FTP, SMTP...) Uses transport-layer information only IP Source Address, Destination Address Protocol (TCP, UDP, ICMP, etc) TCP or UDP source & destination ports TCP Flags (SYN, ACK, FIN, RST, PSH, etc) ICMP message type Examples DNS uses port 53» Block incoming port 53 packets except known trusted servers Issues Stateful filtering Encapsulation: address translation, other complications Fragmentation 1

Packet Filtering Examples Policy: Do not allow outbound email Implementation? Policy: Do not allow inbound connections Implementation? Policy: Do not allow HTTP GET requests Implementation? 7 October 24, 2011 8 Complication for firewalls Normal IP Fragmentation Abnormal Fragmentation Flags and offset inside IP header indicate packet fragmentation Low offset allows second packet to overwrite TCP header at receiving host NAT: Address Translation Advantages of NAT rest of Internet 138.76.29.7 All datagrams leaving local network have same single source NAT IP address: 138.76.29.7, different source port numbers local network (e.g., home network) 10.0.0/24 10.0.0.4 Datagrams with source or destination in this network have 10.0.0/24 address for source, destination (as usual) 10.0.0.1 10.0.0.2 10.0.0.3 Motivations for NAT Limited address space Prevent unsolicited inbound requests» Port numbering: host behind NAT not reachable as server Avoid renumbering if provider changes» Small/mid-sized LANs inherit address space from ISP Addresses hidden by NAT Normal routing» Outgoing msg from 171.64.78.90 contains sending address» Recipient or observer can access 171.64.78.90 Addressing with NAT» NAT rewrites outgoing packet so recipient sees public addr only» An outside computer cannot see 171.64.78.90 Illustration: Kurose and Ross 2

Stateful or Dynamic Packet Filtering Application layer (HTTP) Turn click into HTTP request GET http://www.yahoo.com/r/mp HTTP/1.1 Host: www.yahoo.com Connection:keep-alive Transport layer (TCP) Intrusion Detection Break message into packets (TCP segments) Should be delivered reliably & in-order GET http://www.yahoo.com/r/mp HTTP/1.1 Host: www.yahoo.com Connection:keep-alive 3 yahoo.c 2 p://www. 1 GET htt and let me know when they got there October 24, 2011 15 CSE 127 -- October 24, 2011 16 General intrusion detection Misuse detection port scan Many intrusion detection systems Close to 100 systems with current web pages -based, host-based, or combination Two basic models Misuse detection model» Maintain data on known attacks» Look for activity with corresponding signatures Anomaly detection model» Try to figure out what is normal» Report anomalous behavior Fundamental problem: too many false alarms Attacks can be OS specific Bugs in specific implementations Oversights in default configuration Attacker scans network to find vulnerabilities Port scan tries many ports on many IP addresses If characteristic behavior detected, mount attack» SGI IRIX responds TCPMUX port (TCP port 1)» If machine responds, SGI IRIX vulnerabilities can be tested and used to break in Port scan activity can be detected 3

IDS Circumvention IDS Circumvention IDS circumvention Insertion Evasion Obfuscation Who wins in this situation? Rices theorem: for a non trivial property of a partial function, there is no general and effective method to decide whether an algorithm computes a partial function with that property Translation: You cant recreate the end systems processing of input and create the Perfect IDS October 24, 2011 19 October 24, 2011 20 (D)DoS Floods (Distributed) Denial of Service Attack Anything that keeps legitimate users away Dumb, Smart, & in between Lots of Packets works! ICMP Ping Flood Syn Flood Resource Exhaustion Attack Start TCP handshake; never finish October 24, 2011 21 October 24, 2011 22 Syn Flood Mitigation Reflection Attack Problem: syn queue overflow Intuition: ACK must include (servers ACK#+1) as clients ACK# Solution: encode a secret value in the ACK# Initial ACK# = (time). (MSS). s(serverip, serverport,clientip,clientport,t) Server can reconstruct & verify all information from SYN using cookie value Problem: Source & Destination address fields in IP packets not authenticated Problem: When receiving unexpected SYN, must respond with RST Attack: Set SRC=target, DST=any, FLAGS=syn What happens? October 24, 2011 23 October 24, 2011 24 4

Reflection Attack Aside: Backscatter Detection Internet path lengths are not guessable Initial TTL fields usually not random Does RST path length real path length? Source spoofer usually picks a random source address Individual IP vantage point looks like noise Large segment of IPv4: can see attacks Reflection attack prevention? October 24, 2011 25 26 Application level DDoS Questions? IRC Botnet As an attacker: Voluntary Botnets Manipulate assumptions LOIC Use Rices Theorem to your advantage slowloris Use old attacks in new domains As a defender: Defense in depth» Trust once, verify everywhere Randomize anything that could be guessed Think like an attacker :) 27 October 24, 2011 28 5