Network Security Controls. CSC 482: Computer Security



Similar documents
CIT 480: Securing Computer Systems. Firewalls

CIT 480: Securing Computer Systems. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Firewalls. Chapter 3

Chapter 9 Firewalls and Intrusion Prevention Systems

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Security Technology: Firewalls and VPNs

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Introduction of Intrusion Detection Systems

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Network Access Security. Lesson 10

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Second-generation (GenII) honeypots

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

NETWORK SECURITY (W/LAB) Course Syllabus

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

INTRODUCTION TO FIREWALL SECURITY

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewalls, IDS and IPS

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewalls. Ahmad Almulhem March 10, 2012

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

IDS / IPS. James E. Thiel S.W.A.T.

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

FIREWALLS & CBAC. philip.heimer@hh.se

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

CS5008: Internet Computing

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Chapter 8 Security Pt 2

Firewalls and Intrusion Detection

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Firewalls (IPTABLES)

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Network Defense Tools

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

INTRUSION DETECTION SYSTEMS and Network Security

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

PROFESSIONAL SECURITY SYSTEMS

Chapter 4: Security of the architecture, and lower layer security (network security) 1

CMPT 471 Networking II

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

8. Firewall Design & Implementation

Computer Security: Principles and Practice

Firewall Design Principles Firewall Characteristics Types of Firewalls

How To Understand A Firewall

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Networking for Caribbean Development

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Computer Security DD2395

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Chapter 8 Network Security

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

A S B

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Computer Security DD2395

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

USE HONEYPOTS TO KNOW YOUR ENEMIES

CIT 380: Securing Computer Systems

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Firewall Design Principles

Security vulnerabilities in the Internet and possible solutions

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Linux Network Security

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Internet Security Firewalls

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

How To Protect Your Network From Attack From Outside From Inside And Outside

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Transcription:

Network Security Controls

Topics 1. Firewalls 2. Virtual Private Networks 3. Intrusion Detection and Prevention 4. Honeypots

What is a Firewall? A software or hardware component that restricts network communication between two computers or networks. In buildings, a firewall is a fireproof wall that restricts the spread of a fire. Network firewall prevents threats from spreading from one network to another.

Internet Firewalls Many organizations/individuals deploy a firewall to restrict access to their network from Internet.

What is a Firewall? (2) A mechanism to enforce security policy Choke point that traffic has to flow through. ACLs on a host/network level. Policy Decisions: What traffic should be allowed into network? Integrity: protect integrity of internal systems. Availability: protection from DOS attacks. What traffic should be allowed out? Confidentiality: protection from data leakage.

Types of Firewalls Packet Filters (Stateless) If individual packet matches rules, then either accept or drop it. Stateful Filters Maintains records of all connections, so that It can accept/deny entire TCP or UDP session. Application Layer Firewalls A proxy server that relays byte streams from client to server and vice versa. Inspects application headers for undesirable sites and application data for undesirable content (malware etc.)

Stateless Firewalls A stateless firewall doesn t maintain any remembered context (or state ) with respect to the packets it is processing. Instead, it treats each packet attempting to travel through it in isolation without considering packets that it has processed previously. SYN Seq = x Port=80 Client SYN-ACK Seq = y Ack = x + 1 Trusted internal network ACK Seq = x + 1 Ack = y + 1 Firewall Server Allow outbound SYN packets, destination port=80 Allow inbound SYN-ACK packets, source port=80

Packet Filtering Information Forward or drop packets based on TCP/IP header information, most often: IP source and destination addresses Protocol (ICMP, TCP, or UDP) TCP/UDP source and destination ports TCP Flags, especially SYN and ACK ICMP message type Dual-homed hosts also make decisions based on: Network interface the packet arrived on. Network interface the packet will depart on.

Stateful Firewalls Allow only requested TCP connections: 76.120.54.101 128.34.78.55 SYN Seq = x Port=80 Server Client SYN-ACK Seq = y Ack = x + 1 Trusted internal network ACK Seq = x + 1 Ack = y + 1 (blocked) SYN-ACK Seq = y Port=80 Attacker Allow outbound TCP sessions, destination port=80 Firewall Established TCP session: (128.34.78.55, 76.120.54.101) Firewall state table

Gateway Router Host Firewall Deployment Filtering at interface between networks allows control via a choke point. Can filter spoofed IP addresses. Filter packets on each individual computer. How to manage thousands of packet filters?

Ingress/Egress Filtering Block spoofed IP addresses Ingress Filtering Drop packets arriving on external interface whose source IP addresses claims to be from internal network. Egress Filtering Drop packets arriving on internal interface whose source IP address is not from internal network.

Packet Filtering Summary Advantages: One packet filter can protect an entire network Efficient (requires little CPU) Supported by most routers Disadvantages: Difficult to configure correctly Must consider rule set in its entirety Difficult to test completely Performance penalty for complex rulesets Stateful packet filtering much more expensive Enforces ACLs at layer 3 + 4, without knowing any application details

Proxy Servers Proxy host relays Transport/App connections Client makes connection to proxy. Proxy forwards connection to server. Proxy can provide multiple security features: Access Control Authentication Logging Anonymity

Example: SOCKS v5 Socks Server Socks Client Library Clients must be linked against library. Library offers replacements for UNIX network socket system calls. User Authentication Protocols Cleartext username/password. GSS-API authentication.

Application Layer Firewalls Application layer rules HTTP: URLs, headers, etc. SMTP: spam statistics More complex Only 2 16 ports, but An infinite number of URLs.

Single Firewall Simplest type of firewall one host acts as a gateway between internal and external networks.

DMZ Firewall Architecture

Firewall Limitations Cannot protect from internal attacks May be able to limit access with internal firewalls to a segment of your network. Cannot protect you from user error Users will still run trojan horses that make it past your AV scanner. Firewall mechanism may not precisely enforce your security policy.

Tunneling Tunneling: Encapsulation of one network protocol in another protocol Carrier Protocol: protocol used by network through which the information is travelling Encapsulating Protocol: protocol (GRE, IPsec, L2TP) that is wrapped around original data Passenger Protocol: protocol that carries original data Can be used to encrypt connections or provider other security features not available to passenger protocol.

Tunneling vs. Eavesdropping Tunnel over ssh or SSL to offer encryption of packets. Client Encapsulating protocol (does end-to-end encryption and decryption) Server TCP/IP Untrusted Internet TCP/IP Payloads are encrypted here

IPSec IPSec defines a set of protocols to provide confidentiality and authenticity for IP packets Each protocol can operate in one of two modes, transport mode or tunnel mode. In transport mode, additional IPsec header information is inserted before the data of the original packet, and only the payload of the packet is encrypted or authenticated. In tunnel mode, a new packet is constructed with IPsec header information, and the entire original packet, including its header, is encapsulated as the payload of the new packet.

Virtual Private Network (VPN) Two or more computers or networks connected by a private tunnel through a public network (typically the Internet.) Requirements: Confidentiality: encryption Integrity: MACs, sequencing, timestamps Firewall Interactions Tunnels can bypass firewall Firewall is convenient place to add VPN features

Types of VPNs Remote access VPNs allow authorized clients to access a private network that is referred to as an intranet. For example, an organization may wish to allow employees access to the company network remotely but make it appear as though they are local to their system and even the Internet itself. To accomplish this, the organization sets up a VPN endpoint, known as a network access server, or NAS. Clients typically install VPN client software on their machines, which handle negotiating a connection to the NAS and facilitating communication. Site-to-site VPN solutions are designed to provide a secure bridge between two or more physically distant networks. Before VPN, organizations wishing to safely bridge their private networks purchased expensive leased lines to directly connect their intranets with cabling.

Models of Intrusion Detection 1. Anomaly detection What is usual, is known. What is unusual, is bad. Statistical IDS. Need to update profile so that it matches current usual activities on systems. 2. Misuse detection What is bad is known. Look for what is bad, hope it doesn t change. Rule based IDS. Need to regularly update db of intrusion signatures.

Possible Alarm Outcomes Intrusion Attack No Intrusion Attack Alarm Sounded True Positive False Positive No Alarm Sounded False Negative True Negative

Base-Rate Fallacy Difficult to create IDS with high true-positive rate and a low false-negative rate. If the number of actual intrusions is relatively small compared to the amount of data being analyzed, then the effectiveness of an intrusion detection system can be reduced. In particular, the effectiveness of some IDSs can be misinterpreted due to a statistical error known as the base-rate fallacy. This type of error occurs when the probability of some conditional event is assessed without considering the base rate of that event. CSC 482: Computer Security

Base-Rate Fallacy Example Example case IDS 99% accurate, 1% false positives or negatives IDS generates 1,000,100 log entries. Base rate is 100 malicious events of 1,000,100 examined. Results Of 100 malicious events, 99 will be detected as malicious, which means we have 1 false negative. Of 1,000,000 benign events, 10,000 will be mistakenly identified as malicious. That is, we have 10,000 false positives! Thus, 10,099 alarms sounded, 10,000 of which are false alarms. Roughly 99% of our alarms are false alarms. CSC 482: Computer Security

IDS Components IDS Manager Untrusted Internet router Firewall IDS Sensor IDS Sensor router router

IDS Architecture An IDS is essentially a sophisticated audit system Sensors gathers data for analysis from hosts or network. Manager analyzes data obtained from sensors according to its internal rules. Notifier acts on manager results. May simply notify security officer. May reconfigure sensors or manager to alter collection, analysis methods. May activate response mechanism.

Sguil NSM Console

Intrusion Prevention Systems What else can you do with IDS alerts? Identify attack before it completes. Prevent it from completing. How to prevent attacks? Directly: IPS drops packets, kills TCP sessions. Indirectly: IPS modifies firewall rules. Is IPS a good idea? How do you deal with false positives?

IPS Deployment Types Inline IPS Intranet Non-Inline IPS Intranet

Active Responses by Network Layer Data Link: Shut down a switch port. Only useful for local intrusions. Rate limit switch ports. Network: Block a particular IP address. Inline: can perform blocking itself. Non-inline: send request to firewall. Transport: Send TCP RST or ICMP messages to sender and target to tear down TCP sessions. Application: Inline IPS can modify application data to be harmless: /bin/sh -> /ben/sh

Great Firewall = Firewall + IPS CSC 482: Computer Security

Honeypots and Honeynets Honeypot: a system designed solely for intruders to attack in order to accomplish one or more of the following goals. Also known as a honeynet. 1. Detect intrusions with very few false positives, since legitimate users have no reason to access honeypot. 2. Monitor attacker activities to determine targeted assets, origin, motivation, capabilities, etc. 3. Waste intruder time attacking honeypot, so that defender has time to respond to incident.

Low Interaction Honeypots honeyd: responds to probes on a set of unused IP addresses via shell scripts that can return banners for simple scans like nmap sv. nepenthes: emulates vulnerable Windows services to collect exploits and malware. Dionaea: scriptable honeypot designed to be able to emulate wide variety of vulnerable services to collect exploits and malware. Fakenet: simulates DNS, HTTP, HTTPS to dynamically analyze malware. Returns reasonable responses to malware requests. CSC 482: Computer Security

Medium Interaction Honeypots Kippo is a medium interaction ssh honeypot designed to log brute force attacks and attacker shell commands. Inspired by Kojoney, a LI ssh honeypot. Fake filesystem with the ability to add/remove files. Possibility of adding fake file contents so the attacker can 'cat' files such as /etc/passwd. Only minimal file contents are included. Saves files downloaded with wget for later inspection Deception: ssh pretends to connect, apt-get pretends to install, etc.

High Interaction Honeypots Honeywall sets up tools for HI honeypots. Environment simulation: virtual machines configured with appropriate tools for the next three tasks. Data control: firewalling tools to limit attacker activities to avoid damaging other systems. Data collection: network (snort) and keystroke loggers (Sebek kernel module). Data analysis: tools to extract relevant data from tcpdump logs and more.

Honeymonkey Thug Client Honeypots Microsoft Research project. Network of VMs running IE crawling the web in search of malicious sites that attempt to exploit browsers and distribute malware. Multiple versions of Windows and IE used. Low interaction client honeypot. Emulates multiple browsers and OSes.

Honeytokens A honeytoken is data that is designed solely for attackers to abuse. Any access to the data is an indication of unauthorized use. Attempts to download honeytoken files or database records can be identified by NIDS. Medical record systems will sometimes create fake records for celebrities and politicians. Mailing lists may contain email addresses published nowhere else that point to accounts that accept mail and record sender information. Maps contain fake streets, towns, or islands to identify when competitors copy the map.

Key Points 1. Firewalls Packet filtering (stateless) Stateful firewalls Proxy servers Application layer firewalls 2. Firewall Architectures Positioning on network DMZ architectures 3. Virtual Private Networks Tunneling Protocols: carrier, encapsulating, passenger Virtual Private Networks

Key Points (2) 4. Models of IDS: Anomaly detection: unexpected events (statistical IDS.) Misuse detection: violations of policy (rule-based IDS). 5. IPS Stop intrusions, but what about false positives? Inline vs. non-inline: how do prevention techniques differ? 6. Honeypots deceive attackers 1. Identify intrusions with low false positive rates. 2. Learn more about intrusions, esp. with HI honeypots. 3. Interaction levels: low, medium, high 4. Honeyclients and honeytokens

References 1. William Cheswick, Steven Bellovin, and Avriel Rubin, Firewalls and Internet Security, 2 nd edition, 2003. 2. Simson Garfinkel, Gene Spafford, and Alan Schwartz, Practical UNIX and Internet Security, 3 rd edition, O Reilly & Associates, 2003. 3. Goodrich and Tammasia, Introduction to Computer Security, Pearson, 2011. 4. Ed Skoudis, Counter Hack Reloaded, Prentice Hall, 2006. 5. Elizabeth Zwicky, Brent Chapman, Simon Cooper, Building Internet Firewalls, 2 nd edition, O Reilly & Associates, 2000.