Cyber Security-Tutorial2: From: Sweta Dargad Assistant Professor NTC
Cyber Security-Tutorial2: From: Sweta Dargad Assistant Professor NTC
Cyber Security-Tutorial2: From: Sweta Dargad Assistant Professor NTC
Packet filtering
Application gateways/Proxy Firewalls:
Circuit gateways/ Network layer Firewalls
Unified threat management
FIREWALLS – PACKET FILTERS
FIREWALLS – PACKET FILTERS
Simplest of components
Uses transport-layer information only
IP Source Address, Destination Address
Protocol/Next Header (TCP, UDP, ICMP, etc)
TCP or UDP source & destination ports
TCP Flags (SYN, ACK, FIN, RST, PSH, etc)
ICMP message type
Examples
DNS uses port 53
No incoming port 53 packets except known trusted servers
USAGE OF PACKET FILTERS
Example 1:
Suppose we want to allow inbound mail
(SMTP, port 25) but only to our gateway
machine. Also suppose that mail from some
particular site SPIGOT is to be blocked.
Solution 1:
Example 2:
Now suppose that we want to implement the
policy “any inside host can send mail to the
outside”.
Solution 2:
So why is it wrong?
The ACK signifies that the packet is part of an
ongoing conversation
Packets without the ACK are connection
establishment messages, which we are only
permitting from internal hosts
SECURITY & PERFORMANCE OF PACKET FILTERS
IP address spoofing
Fake source address to be trusted
Add filters on router to block
Tiny fragment attacks
Split TCP header info over several tiny packets
Either discard or reassemble before check
Degradation depends on number of rules applied at any point
Order rules so that most common traffic is dealt with first
Correctness is more important than speed
FIREWALLS – STATEFUL PACKET FILTERS
• A proxy firewall is a network security system that protects network resources by filtering messages at
the application layer. A proxy firewall may also be called an application firewall or gateway firewall.
FIREWALL GATEWAYS
Firewall runs set of proxy programs
Proxies filter incoming, outgoing packets
All incoming traffic directed to firewall
All outgoing traffic appears to come from firewall
Policy embedded in proxy programs
Two kinds of proxies
Application-level gateways/proxies
Tailored to http, ftp, smtp, etc.
Circuit-level gateways/proxies
Working on TCP level
FIREWALLS - APPLICATION LEVEL GATEWAY (OR
PROXY)
APPLICATION-LEVEL FILTERING
FTP
Telnet proxy SMTP
proxy proxy
Application layer firewalls are hosts that run proxy servers, which permit no traffic directly between
networks, and they perform elaborate logging and examination of traffic passing through them.
Since proxy applications are simply software running on the firewall, it is a good place to do logging
and access control.
Application layer firewalls can be used as network address translators, since traffic goes in one side
and out the other after having passed through an application that effectively masks the origin of
the initiating connection.
DUAL-HOME GATEWAY
1. Anomaly Detection
2. Signature Based Detection
ALERTS
• Burglar Alert/Alarm: A signal suggesting that a system has been or is being attacked.
• Detection Rate: The detection rate is defined as the number of intrusion instances detected by the system
(True Positive) divided by the total number of intrusion instances present in the test set.
• False Alarm Rate: defined as the number of 'normal' patterns classified as attacks (False Positive) divided by
the total number of 'normal' patterns.
• ALERT TYPE:-