Chapter 15. Firewalls, IDS and IPS



Similar documents
Firewalls, IDS and IPS

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Firewalls. Chapter 3

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

12. Firewalls Content

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Security Technology: Firewalls and VPNs

allow all such packets? While outgoing communications request information from a

Network Security Topologies. Chapter 11

Firewalls. Network Security. Firewalls Defined. Firewalls

Overview. Firewall Security. Perimeter Security Devices. Routers

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Internet Security Firewalls

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Internet Security Firewalls

- Introduction to Firewalls -

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

CMPT 471 Networking II

Firewall Firewall August, 2003

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

8. Firewall Design & Implementation

INTRODUCTION TO FIREWALL SECURITY

Chapter 9 Firewalls and Intrusion Prevention Systems

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Chapter 11 Cloud Application Development

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

FIREWALLS & CBAC. philip.heimer@hh.se

FIREWALL AND NAT Lecture 7a

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

What would you like to protect?

Firewall Security. Presented by: Daminda Perera

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Firewall VPN Router. Quick Installation Guide M73-APO09-380

How To Understand A Firewall

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Firewalls P+S Linux Router & Firewall 2013

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Firewalls & Intrusion Detection

THE ROLE OF IDS & ADS IN NETWORK SECURITY

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

How To Protect Your Network From Attack From Outside From Inside And Outside

Configuration Example

Chapter 8 Security Pt 2

Internet infrastructure. Prof. dr. ir. André Mariën

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

10 Configuring Packet Filtering and Routing Rules

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Firewall Architecture

Fig : Packet Filtering

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Testing Network Security Using OPNET

ΕΠΛ 674: Εργαστήριο 5 Firewalls

CSE543 - Computer and Network Security Module: Firewalls

Flow Analysis Versus Packet Analysis. What Should You Choose?

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

CSCE 465 Computer & Network Security

Guideline on Firewall

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Configuring Network Address Translation (NAT)

INTRUSION DETECTION SYSTEMS and Network Security

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Security threats and network. Software firewall. Hardware firewall. Firewalls

PROFESSIONAL SECURITY SYSTEMS

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Multi-Homing Dual WAN Firewall Router

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Firewalls and System Protection

NETWORK SECURITY (W/LAB) Course Syllabus

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

COTS SECURITY GUIDANCE (CSG) FIREWALLS

Figure 41-1 IP Filter Rules

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Networking for Caribbean Development

Network Defense Tools

Firewalls and Intrusion Detection

Transcription:

Chapter 15 Firewalls, IDS and IPS

Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet passing through it. If the packet is a provable attack packet, the firewall drops the packet. Firewalls usually record information about each dropped packet in a log file. This process is called logging. If the packet is not a provable attack packet, the firewall passes the packet on to its destination. In firewalls, this is called a pass/deny decision.

Ingress and Egress In ingress filtering, the firewall examines packets entering the network from the outside (Internet). The purpose of ingress filtering is to stop attack packets from entering the firm s internal network. In egress filtering, the firewall filters packets when they are leaving the network. This prevents replies to probe packets from leaving the network.

Firewall Principles The Changing Role of Firewalls In the early 1990s, there was a focus on border security However, some attacks get through the border firewall, and border firewalls provide no protection from internal attackers, attackers who entered the site other than through the Internet, or remote users using VPNs Companies need to employ defense in depth Overall, border firewalls are important but not sufficient.

Danger of Overload Firewall Principles (Continued) If a firewall is overloaded and cannot handle the traffic, it drops unprocessed packets This is the safest choice, because attack packets cannot enter the network However, this creates a self-inflicted denial-of-service attack. So firewalls must have the capacity to handle the traffic Some can handle normal traffic but cannot handle traffic during heavy attacks Need to be able to work at wire speed

Firewall Principles (Continued) Firewall Filtering Methods Firewall Inspection Levels Internet Level Internet and transport layer filtering Attacks and Stateful inspection therefore firewalls began here Static packet inspection Network address translation (NAT) Application Level Attacks growing at the application layer Filter application layer communication Application proxy firewalls Antivirus filtering (general malware filtering) Intrusion prevention systems (also filter internet-level attacks)

Main Border Firewalls

Opening Connections in Stateful Inspection Firewalls Default Behavior Permit connections initiated by an internal host Deny connections initiated by an external host Can change default behavior with access control lists (ACLs) for ingress and egress

Permitting Incoming Connections in a Stateful Inspection Firewall Default Behavior Can be Modified by Access Control Lists (ACLs) Ingress ACL permits some externally-initiated connections to be opened Egress ACL prohibits some internally-initiated connections from being opened On basis of IP address, TCP or UDP port number, and/or IP protocol Sets of if-then rules applied in order

Permitting Incoming Connections in a Stateful Inspection Firewall (Ingress ACL) 1.If TCP destination port = 80, Allow Connection [Pass all HTTP traffic to any webserver. (Port 80 = HTTP)] 2.If TCP destination port = 25 AND destination IP address = 60.47.3.35, Allow Connection [Pass all SMTP traffic to a specific host (mail server), 60.47.3.35. Port 25 = SMTP] Safer than Rule 1 3.Deny ALL [Deny all other externally-initiated connections] (Use the default behavior of stateful inspection firewalls for all other connection-opening attempts)

Well-Known Port Numbers

Main Border Firewall Stateful Inspection I Stateful Firewall Operation If accept a connection Record the two IP addresses and port numbers in state table as OK (open) Accept future packets between these hosts and ports with no further inspection This stops most internet-level attacks Does not address application-level attacks

Main Border Firewall Stateful Inspection I (Continued)

Main Border Firewall Stateful Inspection I (Continued)

Main Border Firewall Stateful Inspection I (Continued)

Stateful Inspection Firewall in Perspective Simplicity and Therefore Low Cost Connection opening decisions are somewhat complex But most packets are part of approved ongoing connections Filtering ongoing packets is extremely simple Therefore, stateful inspection is fast and inexpensive Low Cost Safety Stops nearly all internet-level attacks (Application-level filtering still needed) Dominance for Main Border Firewalls Nearly all use stateful inspection Beyond Stateful Inspection Most main border firewalls also use other inspection methods Denial-of-service filtering Limited application content filtering Etc.

Screening Router Firewall

Firewall Architecture (Single Site) Static packet filtering only filters packets based on administrator defined rules governing allowed ports and IP addresses at the network and transport layers. Dynamic packet filtering provides a better level of security than static packet filtering since it takes a closer look at the contents of the packet and also considers previous connection states.

Static Packet Inspection on Screening Router Firewalls Screening Firewall Routers Add filtering to the border router Filter out many high-frequency, low-complexity attacks For ingress filtering, reduce the load on the main border firewall

Screening Router Firewalls (Continued) High Cost for Sufficient Performance Must buy inspection software for the router (expensive) Usually must upgrade router processing speed and memory (expensive) Good Location for Egress Filtering Stops all replies to probe packets Including those from the border router itself Use Static Packet Filtering Require complex access control lists (ACLs) Because need an ACL statement for each rule

Static Packet Filter Firewall ICMP: Internet Control Message Protocol

Screening Firewall Router Ingress ACL 1. If source IP address = 10.*.*.*, DENY [private IP address range] 2. If source IP address = 172.16.*.* to 172.31.*.*, DENY [private IP address range] 3. If source IP address = 192.168.*.*, DENY [private IP address range] 4. If source IP address = 60.47.*.*, DENY [internal IP address range] 5. If source IP address = 1.33.3.4, DENY [black-holed IP address of attacker]

Network Address Translation (NAT)

The problem Sniffers on the Internet can read packets to and from organizations Detect IP addresses and port numbers of hosts Provides considerable information about potential victims without the risks of sending probing attacks Solution: Disguise (Hide) IP addresses and port numbers of internal hosts.

Perspective on NAT Sniffers on the Internet cannot learn internal IP addresses and port numbers Only learn the translated address and port number By themselves, provide a great deal of protection against attacks External attackers cannot create a connection to an internal computers Sniffers and NAT Sniffers can read stand-in IP addresses and port numbers Can send back packets to these stand-in values; NAT will deliver them to the real host However, most sessions too brief to exploit Still a potential danger if sniffers act quickly Box: Using NAT for Address Multiplication Firm may only be given a limited number of public IP addresses Must use these in packets sent to the Internet May use private IP addresses internally For each public IP address, there can be a separate connection for each possible port Address 60.5.9.8, Port = 2000 Address 60.5.9.8, Port = 2001 Etc. Each connection can be linked to a different internal IP address Can have thousands of internal IP addresses for each public IP address

Application Proxy Firewalls

Application Proxy Firewall Operation

Application Proxy Firewall Client Server Relaying Relay operation: Proxy acts as a server to the client and a client to the server. Full protocol support. Slow processing per packet. Core Protections IP address hiding (sniffer will only see the application proxy firewall s IP address). Packet header destruction.

Core Protections due to Application Proxy Firewall Relay Operation

Application Proxy Firewalls (Continued) Multiple Proxies Each application to be filtered needs a separate proxy program. Small firms usually use a single application proxy firewall with multiple application proxies. Large firms usually use a single application proxy firewall per proxy.

Demilitarized Zone (DMZ)

Demilitarized Zone (DMZ) Subnet for servers and application proxy firewalls accessible via the Internet Hosts in the DMZ must be especially hardened because they will be attacked by hackers Hardened hosts in the DMZ are called bastion hosts Uses Tri-Homed Main Firewalls 3 NICs, each attached to a different subnet One subnet to the border router One subnet for the DMZ (accessible to the outside world) One subnet for the internal network Access from the subnet to the Internet is strongly controlled Access from the DMZ is also strongly controlled Hosts in the DMZ Public servers (public webservers, FTP servers, etc.) Application proxy firewalls External DNS server that only knows host names for hosts in the DMZ

Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs)

Intrusion Detection System (IDS)

Firewalls, IDSs, and IPSs

Firewalls, IDSs, and IPSs (Continued) Sophistication in Filtering Message stream analysis, not just individual packets Reassemble fragmented application messages Deep packet inspection: both internet-level headers and application headers Firewalls Versus IDSs Firewalls drop packets IDSs only generate alarms Too many false positives (false alarms) to drop suspicious packets safely IDSs versus IPSs IDSs send alarms IPSs, using the same filtering mechanisms, actually drops suspicious packets with high confidence of being attacks