* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Screened-host firewall
Internet protocol suite wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
Net neutrality law wikipedia , lookup
Computer network wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Wireless security wikipedia , lookup
Airborne Networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Network tap wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Computer security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Firewalls Oluwatosin Oguntola 07034067944 [email protected] Firewall Security systems Perimeter security for networks Internal separation of critical data Device installed at the point where network connections enter a site Organizations typically deploy a deny-all methodology The flip-side is the accept-all methodology General features General features General features Block access to particular sites on the internet Limit traffic to relevant addresses and ports Prevent certain users from accessing certain servers or services Monitor communication between an internal and external network Can be extended to protect against viruses and OS exploitation attacks Types Router Packet filtering Application firewall systems Stateful inspection Router Packet Filtering Firewalls First generation firewalls Here, a screening router examines packet header travelling between the internet and corporate network Packet headers have information in them such as the IP of sender and receiver and port numbers. Based on this, the router knows what kind of internet service e.g. Web based or ftp is being used to send the data. And using this information can prevent certain packets from being sent between the internet and corporate network Packet Filtering Firewalls – adv. Very simple and stable Performs at the network layer of the OSI Simplicity is also a disadvantage as it’s very vulnerable to attacks from improperly configured filters Also, if a single packet filtering router is compromised, every system on the private network may be compromised Attacks against packet filtering. IP Spoofing; Attacker fakes the IP address of either an internal network host or a trusted network host Source routing specification; Defining the route the packets would take and to bypass the firewall rule. To do this, one must know IP address, subnet mask and default gateway settings at the firewall routing station. Attacks against packet filtering. Miniature fragment attack; The attacker fragments the IP packet into smaller ones and pushes it through the firewall hoping that the first of the sequence would be examined and the others bypassed. Application Level Firewalls Application and Circuit level firewalls Provide greater protection capabilities Where packet filtering allows direct flow of packets between internal and external systems, A&C firewalls allow information to flow but not the direct exchange of packets Both work at the application layer of the OSI Application level gateway analyzes packets through a set of proxies – one for each service Application Level Firewalls Circuit level are generally more efficient Both employ the concept of bastion hosting – heavily fortified and having a single host handling incoming requests thus making it easier to maintain security and track attacks. Pretty much like a fuse. Application level firewalls are set up as proxies Advantages include; hiding the internal network. Disadvantages are poor performance and scalability as internet usage grows Stateful Inspection Firewalls Keeps track of destination IP address of each packet that leaves the organizations network When a message is received, it references what was sent to confirm it is a response Advantages are; control the flow of IP traffic by matching information contained in the headers of connection-oriented or connectionless IP packets at the transport layer Disadvantages include being difficult to administer Firewall implementations Firewall issues Creates a false sense of security Misconfigured firewalls may allow unknown and dangerous services to pass freely Policies may not be appropriately applied and reviewed Can be circumvented through the use of modems which connect users directly to ISPs As most operate at network layer, they cannot stop application based attacks Firewall platforms Hardware based firewalls provide better performance and minimal system overload Software based firewalls are more flexible and scalable although they are slower and have significant overload Appliance type firewalls are faster and easier to recover being that they are hardened operating system based. Intrusion detection systems Works in conjunction with firewalls by monitoring network usage anomalies. Notifies an administrator of perceived threats Categories of IDS Network Based – identify attacks within the monitored network and issue warnings to the operator. Can be placed between the internet and firewall or between the firewall and corporate network. It is not a substitute for a firewall, but complements the firewall. Categories of IDS Host Based – configured for a specific environment and to monitor internal resources. They can detect the modification of an executable program, deletion of files and issue a warning when a privileged command is being run. Components of an IDS Signature based – protect against detected intrusion patterns and the patterns they detect are stored in the form of signatures. Statistical based – need a comprehensive definition of the known and expected behaviour of systems. Neural networks – monitors the general patterns of activity and traffic on a network and creates a database. Similar to statistical but has a self-learning functionality. Features Intrusion detection Evidence collection on intrusive activity Automated response Security policy Interfaces with system tools Security policy management Limitations An IDS can’t help with the ffg weaknesses; Policy definition weaknesses Application level vulnerabilities Back-doors into applications Weaknesses in Identification and Authentication schemes Intrusion Prevention Systems Closely related to IDS Not only detect, but also prevent Helps in limiting damage done to systems that are attacked Must be properly configured and tuned to be effective Threshold settings too high or low will lead to limited effectiveness Could be subject to fake attacks which leaves them dysfunctional. Examples of Firewall Implementations Screened-host firewall: this uses a packet filtering router and a bastion host i.e. Implementing network layer as well as application level security. This means that an intruder would have to penetrate 2 separate systems before reaching the private network. It’s configured thus: Bastion Host A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer. It is hardened in this manner primarily due to its location and purpose, which is either on the outside of the firewall or in the DMZ and usually involves access from untrusted networks or computers Screened Host Bastion host connected to the private network with a packet filtering router between the internet and the bastion host. Router filtering rules allow inbound traffic to access only the bastion which blocks access to internal systems Examples of Firewall Implmtns Dual-homed Firewall: firewall system that has 2 or more network interfaces for the separate networks they are facing – it is a more restrictive form of a screened-host firewall in which a dual homed bastion host is configured with one interface established for information servers and another for the private network Examples of Firewall Implmtns DMZ or screened subnet firewall: uses 2 packet filtering routers and a bastion host, it creates the most secure firewall system. The DMZ acts as a small isolated network for an organization’s public servers, bastion host information servers and modem pools. key benefits are – intruder must penetrate 3 separate devices and private network addresses are not disclosed to the internet plus internal systems do not have direct access to the www Honeypots and Honeynets Software application that pretends to be an unfortunate server on the internet and not setup actively to prevent breakins. Rather acts a decoy to lure hackers and is more valuable when targeted. Types of honeypots High-interaction – Give hackers a real environment to attack Low-interaction – Emulate production environments and as such provide limited information. An IDS triggers a virtual alarm when an attacker breaches security of any networked computer. Some Terms Data Owner – generally managers and directors responsible for using the information to run and control the business. Security responsibilities include; Authorizing access Ensuring access rules are updated when personnel changes occur Regularly reviewing access rules for their data Some Terms Data Custodians – responsible for storing and safeguarding the data and include ITS personnel such as systems analysts and computer operators Security Admin – provides adequate physical and logical security for IS programs, data and equipment New Users – Pg 370 Some Terms Data Users – including the internal and external users. Their access level should be authorized by a --------------- and restricted/monitored by a ---------------