What would you like to protect?



Similar documents
Computer Security: Principles and Practice

Computer Security DD2395

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Firewalls CSCI 454/554

Computer Security DD2395

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

Proxy Server, Network Address Translator, Firewall. Proxy Server

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Security threats and network. Software firewall. Hardware firewall. Firewalls

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Security Technology: Firewalls and VPNs

12. Firewalls Content

Firewalls (IPTABLES)

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Chapter 20. Firewalls

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewall Design Principles Firewall Characteristics Types of Firewalls

CMPT 471 Networking II

Cornerstones of Security

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Internet Security Firewalls

How To Protect Your Network From Attack From Outside From Inside And Outside

Lecture 23: Firewalls

Intranet, Extranet, Firewall

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

ΕΠΛ 674: Εργαστήριο 5 Firewalls

How To Protect Your Network From Attack

Network Security and Firewall 1

Internet infrastructure. Prof. dr. ir. André Mariën

Firewalls. Ahmad Almulhem March 10, 2012

CSCE 465 Computer & Network Security

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Firewalls. Mahalingam Ramkumar

Firewall Architecture

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

Chapter 15. Firewalls, IDS and IPS

Cryptography and network security

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

INTRUSION DETECTION SYSTEMS and Network Security

Guideline on Firewall

Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July Network Security 08

Network Security Topologies. Chapter 11

Chapter 6: Network Access Control

Tutorial 3. June 8, 2015

Firewalls and System Protection

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewalls, IDS and IPS

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

ICANWK406A Install, configure and test network security

Compter Networks Chapter 9: Network Security

Overview. Firewall Security. Perimeter Security Devices. Routers

Deploying Firewalls Throughout Your Organization

8. Firewall Design & Implementation

Firewall Security. Presented by: Daminda Perera

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Chien-Chung Shen

allow all such packets? While outgoing communications request information from a

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

- Introduction to Firewalls -

FIREWALL ARCHITECTURES

- Introduction to PIX/ASA Firewalls -

INTRODUCTION TO FIREWALL SECURITY

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

CSCI Firewalls and Packet Filtering

Security Awareness. Wireless Network Security

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

ABSTRACT CHAPTER I. Preliminary Background

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Transcription:

Network Security

What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber crime Security aspects for your data are the usual ones: Confidentiality Integrity Availability When communicating the other party s identity must be verified = > Authentication

Authentication How do you know with whom you are communicating?

Integrity and Confidentiality How do you know that the information has not been modified and/or intercepted? Man in the middle

Availability Attack against availability is called denial of service Extremely difficult to be protected against Example SYN-flooding Ping of death Mail bombing

NETWORK INSECURITY

Network insecurity Reasons for security problems in networks: Resource sharing - Access by many users to many systems - How to establish access control - Single sign on (SSO) Complexity of systems - Diversity - Changeability - Heterogeneity

Network insecurity 2 Unknown perimeter boundary - Difficult to define and/or know. Where are the Intranet boundaries? - To which systems are you connected? Security policies for these? - Mobile devices makes it all worse Several points of attack - Targets as well as attack origins - Increases threat level significantly

Network insecurity 3 Anonymity - Your identity will most likely be revealed - The attacker will be anonymous Unknown communication path - Several routes between two nodes - Lack of control of the network

Network insecurity 4 Insecure Medium - It is almost impossible to secure the network itself, i.e. the communication links - You must always assume that attackers are able to bug and modify all traffic

FIREWALLS

Firewalls A firewall is an access control device between two networks. A firewall monitors all traffic (in both directions) and filters away (denies) unwanted traffic Thus it protects against attacks from outside Internet

Firewalls The firewall determines which inside services may be accessed from outside and which outsiders that are allowed to access to those inside services. It determines which outside services may be accessed by insiders. Internet

Firewall Capabilities and Limits capabilities: defines a single choke point provides a location for monitoring security events convenient platform for some Internet functions such as NAT 1, usage monitoring, IPSEC VPN 2 s limitations: cannot protect against attacks bypassing firewall may not protect fully against internal threats improperly secure wireless LAN laptop, PDA, portable storage device infected outside then used inside 1. Network Address Translation 2. Virtual Private Network

Firewalls basic functionality A firewall implements an organization s security policy with respect to Internet The stance of a firewall describes the fundamental security philosophy of the organisation The default deny (discard) stance: everything is denied unless specifically permitted The default permit (forward) stance: everything is permitted unless specifically denied

Firewalls techniques Basic principles: Packet filter Application-level gateway (proxy) Circuit-level gateway Stateful inspection (dynamic filtering) Architectures: Packet filtering router Single-homed host Dual-homed host Demilitarized Zone (DMZ)

Firewalls, basic principles (and architecture): Packet filter Internet Internal network Packet filtering router Allows or denies a packet based on address, direction, port and protocol Does not understand the contents of the packet Advanced variation: dynamic filtering/stateful inspection

Packet Filter Rules

Firewalls, basic principles: Application-level gateway (proxy) Proxy server Internet Real server Proxy client Firewall Offers transparent forwarding of services Connections terminate in the firewall Internal systems are not directly visible to the outside

Application-Level Gateway acts as a relay of application-level traffic user contacts gateway with remote host name authenticates themselves gateway contacts application on remote host and relays TCP segments between server and user must have proxy code for each application may restrict application features supported more secure than packet filters but have higher overheads

Circuit-level gateway A Circuit-level gateway sets up and relays 2 TCP connections, one to an internal host and one to an external host, without any further filtering Logically, it acts as a wire. (Cp circuit-switched n/w) Can be implemented by an application-level gateway. Is often used for outgoing connections, where the internal user is trusted.

Host-Based Firewalls A software module used to secure an individual host available in (or as an add-on for) many O/S often located in servers advantages: taylored filter rules for specific host needs protection from both internal/external attacks additional layer of protection to stand-alone firewall

Personal Firewall controls traffic flow to and from a PC and external network (Internet) for both home or corporate use may be software module on PC typically much less complex primary role to deny unauthorized remote access to the PC may also monitor outgoing traffic to detect and block malware

Firewalls, architectures: Single-Homed Bastion Host Single-homed Bastion host Internet Internal network Packetfiltering router Screened host firewall system The Bastion Host performs authentication and proxy functions The packet filter only accepts packets to/from Bastion Host

Firewalls, architectures: Dual-homed Bastion Host Packetfiltering router Internet Internal network Dual-homed Bastion Host A computer with two network interfaces Stops pass-by attacks, since the traffic must pass the Bastion Host

Firewalls, architectures: Demilitarized Zone (DMZ) Bastion host DMZ Internet Internal network Inner router Perimeter network Outer router Screened subnet firewall Web- and mail-servers etc are placed in DMZ Provides in-depth defence

Distributed Firewalls

Firewalls functional limitations Protects only those connections that passes the firewall - is the firewall really the only connection to Internet? Does not protect against insiders Does not protect againts viruses Does not protect against data-driven attacks Open for availability attacks Errors, weaknesses and deficient installations may impair functionality

Firewalls - problems Must be installed and adapted, which could be difficult Installation details may be important Must be maintained Difficult to test Affects the performance of the Internet connection? May be seen as a hindrance by the users

Virtual Private Networks