Introduction To Network Security
Introduction To Network Security
Network Security
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 1
Agenda
• Security Year in Review
Slammer, et. al.
• Security Policy
Setting a Good Foundation
• Extended Perimeter Security
Define the Perimeter, Firewalls, ACLs
• Identity Services
Passwords, Tokens, PKI, Biometrics
• Secure Connectivity
Work Happens Everywhere, Virtual Private Networks
• Intrusion Protection
Network, Host
• Security Management
Wrapping it All Together
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 2
Agenda
• Security Year in Review
Slammer, et. al.
• Security Policy
Setting a Good Foundation
• Extended Perimeter Security
Define the Perimeter, Firewalls, ACLs
• Identity Services
Passwords, Tokens, PKI, Biometrics
• Secure Connectivity
Work Happens Everywhere, Virtual Private Networks
• Intrusion Protection
Network, Host
• Security Management
Wrapping it All Together
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 3
Security Year in Review
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 4
Are Incidents Decreasing?
Type of Crime 2001 2002
80000
70000
60000
50000
40000
30000
20000
10000
0
1988 1990 1992 1994 1996 1998 2000 2002
(*) An Incident May Involve One Site or Hundreds (or Even Thousands) of Sites;
Also, Some Incidents May Involve Ongoing Activity for Long Periods of Time
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 6 .
Two of the Most Serious Intruder Activities
Reported to the CERT/CC in 2002
• Exploitation of vulnerabilities in Microsoft SQL Server
Intruders compromised systems through the automated exploitation of null
or weak default SA passwords in Microsoft SQL Server and Microsoft Data
Engine; the CERT/CC published advice on protecting systems that run
Microsoft SQL Server in CA-2002-04 (February 25, 2002)
In July 2002, intruders continued to compromise systems and obtain
sensitive information by exploiting several serious vulnerabilities in the
Microsoft SQL Server; the CERT/CC published additional advice in CA-2002-
22 (July 29, 2002)
• Apache/mod_ssl Worm
Intruders used a piece of self-propagating malicious code (referred to here
as Apache/mod_ssl) to exploit a vulnerability in OpenSSL, an open-source
implementation of the Secure Sockets Layer (SSL) protocol
The CERT/CC initially published CA-2002-23 (July 30, 2002), describing four
vulnerabilities in OpenSSL that could be used to create denial of service;
when these and other vulnerabilities finally manifested themselves in the
form of the Apache/mod_ssl Worm, the CERT/CC published advice in CA-
2002-27 (September 14, 2002)
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 7
The SQL Slammer Worm:
What Happened?
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 8
The SQL Slammer Worm:
30 Minutes after “Release”
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 12
Start with a Security Policy
• Security policy defines and sets a good
foundation by:
Definition—Define data and assets to be covered by
the security policy
Identity—How do you identify the hosts and
applications affected by this policy?
Trust—Under what conditions is communication
allowed between networked hosts?
Enforceability—How will the policies implementation
be verified?
Risk Assessment—What is the impact of a policy
violation? How are violations detected?
Incident Response—What actions are required upon
a violation of a security policy?
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 13
What Is a Security Policy?
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 14
Why Create a Security Policy?
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 15
What Should the
Security Policy Contain?
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 16
Security Policy Elements
Data Assessment
Vulnerabilities
Host Addressing
Denial of Service
Application Definition POLICY
Misuse
Usage Guidelines
Reconnaissance
Topology/Trust Model
Manage
Monitor
Content-based detection and response
Employee monitoring Policy
• Audit
Security posture assessment
Vulnerability scanning
Patch verification/application auditing
• Manage Audit
Secure device management
Security Wheel
Event/data analysis and reporting
Network security intelligence
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 18
Risk Assessment
• Some elements of network security are
absolute, others must be weighed relative
to the potential risk
When you connect to the Internet, the Internet connects
back to you
• Sound operational procedures and management
are easier to implement than technical solutions
You can’t secure a bad idea
• The cost of secure solutions must be factored
into the overall Return on Investment (ROI)
Security must be included in planning and design
Effective security requires managerial commitment
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 19
What Is Trust?
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 20
Incident Response
• Attacks are intentional, there are no
accidental or stray IP packets
• Four levels of incident response:
Network misuse
Reconnaissance
Attack
Compromise
• Without incident response plans, only
passive defenses have value
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 21
Agenda
• Security Year in Review
Slammer, et. al.
• Security Policy
Setting a Good Foundation
• Extended Perimeter Security
Define the Perimeter, Firewalls, ACLs
• Identity Services
Passwords, Tokens, PKI, Biometrics
• Secure Connectivity
Work Happens Everywhere, Virtual Private Networks
• Intrusion Protection
Network, Host
• Security Management
Wrapping it All Together
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 22
Extended Perimeter Security
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 23
Can You Define the Perimeter?
Enterprise IP Telephony
Mobility Security/VPN
Campus LAN
International
Sales Offices
Multiservice
WAN (Sonet, IP,
ATM, Frame
Relay) Suppliers
Campus/WAN
Mainframe
Backbone
Video
Conferencing
Multi-Gigabit
Ethernet
ISDN Telecommuters
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 25
Access Control Lists (ACLs)
20 bytes
Source IP Address
Destination IP Address
IP Packet Header
• Dynamic ACLs
Lock-and-key filtering (Dynamic ACLs) allows
an authenticated user to pass traffic that would
normally be blocked at the router
• Reflexive ACLs
Creates a temporary ACL to allows specified IP
packets to be filtered based on TCP or UDP
session information; the ACL “expires” shortly
after the session ends (no sequence #)
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 27
Firewalls
• Four types of firewalls
Proxies (application-layer firewalls)
Stateful
Hybrid
Personal
• Implementation methods
Software
Appliance
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 28
Proxy Firewalls
• Proxy firewalls permit no traffic to pass
directly between networks
• Provide “intermediary” style connections
between the client on one network and the
server on the other
• Also provide significant logging and
auditing capabilities
• For HTTP (application specific) proxies all
web browsers must be configured to point
at proxy server
• Example Microsoft ISA Server
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 29
Stateful Firewalls
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 30
Hybrid Firewalls
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 31
Personal Firewalls
• Personal firewalls
Protecting remote users/home users
Watching inbound/outbound traffic
Creating basic rules
• Example—ZoneAlarm
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 32
Agenda
• Security Year in Review
Slammer, et. al.
• Security Policy
Setting a Good Foundation
• Extended Perimeter Security
Define the Perimeter, Firewalls, ACLs
• Identity Services
Passwords, Tokens, PKI, Biometrics
• Secure Connectivity
Work Happens Everywhere, Virtual Private Networks
• Intrusion Protection
Network, Host
• Security Management
Wrapping it All Together
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 33
Identity Services
• User identity
• Passwords
• Tokens
• PKI
• Biometrics
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 34
User Identity
• Mechanisms for proving who you are
Both people and devices can be authenticated
• Correlates an
authorized user
with network
resources
Username and Password Required
PIX
Enter username for CCO at www.com
Firewall
OK Cancel
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 37
Passwords
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 38
Tokens
User Name:
Access Is
jdoe
Password: Granted or
234836
OK
Denied Cancel
Ace Server
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 39
Public Key Infrastructure (PKI)
• Relies on a two-key system
J Doe signs a document with his private key
Person who receives that document uses JDoe’s
public key to:
Verify authenticity and decrypt
I am
jdoe! Authenticate
Internet
and Decrypt
Certificates
Signed by
us.org
This Is
jdoe
jdoe
Signed by
us.org Certificate Certificate Authority
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 40
Biometrics
• Authentication based on physiological or
behavioral characteristics
Features can be based on:
Face
Fingerprint
Eye
Hand geometry
Handwriting
Voice
• Becoming more accepted and widely used
Already used in government, military, retail, law
enforcement, health and social services, etc.
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 41
Agenda
• Security Year in Review
Slammer, et. al.
• Security Policy
Setting a Good Foundation
• Extended Perimeter Security
Define the Perimeter, Firewalls, ACLs
• Identity Services
Passwords, Tokens, PKI, Biometrics
• Secure Connectivity
Work Happens Everywhere, Virtual Private Networks
• Intrusion Protection
Network, Host
• Security Management
Wrapping It All Together
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 42
Secure Connectivity
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 43
Work Happens Everywhere
Increasing Need for Transparent Corporate Connectivity
• At home (teleworking)
137 million telecommuters by 2003
40% of U.S. telecommuters from large or
mid-size firms
Source: On the Road (TIA Travel Poll, 11/99); At Home (Gartner 2001,
Cahners Instat 5/01); At Work (Wharton Center for Applied Research)
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 44
What Are VPNs?
Regional Sites
Branches
SoHo
Telecommuters
Mobile Users
Virtual Private
Central/HQ
Network
Partners Customers
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 45
Secure Connectivity
• Defines “peers”
Two devices in a network that need to connect
Tunnel makes peers seem virtually next to each other
Ignores network complexity in between
• Technologies
PPTP—Point-to-Point Tunneling Protocol
L2TP—Layer 2 Tunneling Protocol
IPSec
Secure shell
SSL
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 46
Encryption
• Symmetric Cryptography
Uses a shared secret key
to encrypt and decrypt
transmitted data
Data flow is bidirectional
• Provides data confidentiality only
Does not provide data integrity or
non-repudiation
• Examples: DES, 3DES, AES
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 47
Symmetric Cryptography
Cleartext Cleartext
Secret
Encrypt Key Decrypt
(One)
(Lock) (Unlock)
Ciphertext Ciphertext
Data
Confidentiality
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 48
Encryption
• Asymmetric cryptography
Also known as Public Key Cryptography
Utilizes two keys: private and public keys
Two keys are mathematically related but
different values
• Computationally intensive
• Provides data confidentiality
Can provide for data integrity as well
as non-repudiation
• Examples: RSA Signatures
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 49
Asymmetric Cryptography
Cleartext Cleartext
Public Private
Key Key
Encrypt Decrypt
(Lock) (Unlock)
Ciphertext Ciphertext
Key
Confidentiality
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 50
Digital Signatures
Message
One-Way Hash
Function Pri
(MD5, SHA1)
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 51
Security Association
IKE SA—Main Mode
IPSec SAs—Quick Mode
Peer Peer
network entities
Encapsulating Security Payload (ESP)
IPSec is an evolving ESP ESP ESP
IP TCP Data
standard Header Trailer Auth
Encrypted
Authenticated
*RFC 2401–2412
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 53
Key Management
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 54
An IPSec VPN Is…
• IPSec provides the framework that lets you
negotiate exactly which options to use
IPSec provides flexibility to address different
networking requirements
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 57
Monitoring
Where Did
This Car
Where Is
Come
This Van
from?
Going?
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 58
Network Scanning
• “Active” tool
Identifies devices on the network
Useful in network auditing
• “Fingerprinting”
How a scanner figures out what OS
and version is installed
• Examples: Nmap, Nessus
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 59
Packet Sniffing
• Diagnostic tools
Used capture packets
Used to examine packet data (filters)
Can reconstruct sessions and streams
• Sniffers can be “promiscuous”
Passive, listening
• Examples: Sniffer, Ethereal
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 60
Intrusion Detection
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 62
Intrusion Detection Approaches
Misuse/Signature vs.
Anomaly Detection
Network vs. Host-Based
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 63
Anomaly vs. Signature Detection
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 64
Host vs. Network-Based
• Host-based “agent” software monitors
activity on the computer on which it is
installed
Cisco HIDS (Okena)—System activity
TripWire—File system activity
• Network-based appliance collects and
analyzes activity on a connected network
• Integrated IDS
Network-based IDS functionality as deployed
in routers, firewalls, and other network devices
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 65
Some General Pros and Cons
Pros Cons
• Can verify success or failure • Impacts host resources
of attack
• Operating system dependent
Host- • Generally not impacted by
• Scalability—requires one
Based bandwidth or encryption
agent per host
• Understands host context and
may be able to stop attack
IP Address
Passive Interface
No IP Address
Monitoring the Network
Data Capture
Data Flow
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 67
Host IDS Sensor
Syslog
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 68
Typical IDS Architecture
• Management console
Management
Real-time event display Console
Event database
Sensor configuration
• Sensor
Packet signature analysis Component
Communications
Generate alarms Host-
Based
Response/ IDS
countermeasures IDS Sensor
• Host-based Production
Generate alarms Network Segment
Response/countermeasures
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 69
Too Many Choices?
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 70
Agenda
• Security Year in Review
Slammer, et. al.
• Security Policy
Setting a Good Foundation
• Extended Perimeter Security
Define the Perimeter, Firewalls, ACLs
• Identity Services
Passwords, Tokens, PKI, Biometrics
• Secure Connectivity
Work Happens Everywhere, Virtual Private Networks
• Intrusion Protection
Network, Host
• Security Management
Wrapping It All Together
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 71
Security Management
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 72
Wrapping It All Together
• In the previous sections we discussed:
Security policy
Perimeter security and filtering
Identity services
Virtual Private Networks
Intrusion detection and prevention systems
• No one system can defend your networks
and hosts
With all this technology, how do we survive?
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 73
Integrated Network Security
Security Management
Management Device Manageability, Embedded Management Tools, Security Policy,
Monitoring and Analysis, Network and Service Management
End-to-End
Coverage
Network and End Point Security
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 74
Security Management
• How to manage the network securely
• In-band versus out-of-band management
In-band management—management information travels
the same network path as the data
Out-of-band management—a second path exists to
manage devices; does not necessarily depend on the
LAN/WAN
• If you must use in-band, be sure to use
Encryption
SSH instead of telnet
• Making sure that policies are in place and that
they are working
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 75
Syslog
• A protocol that supports the transport
of event notification messages
Originally developed as part of BSD Unix
• Syslog is supported on most
internetworking devices
• BSD Syslog—IETF RFC 3164
The RFC documents BSD Syslog
observed behavior
• Work continues on reliable and
authenticated Syslog
http://www.employees.org/~lonvick/index.shtml
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 76
Log Analysis
• Log analysis is the process of examining
Syslog and other log data
Building a baseline of what should be considered
normal behavior
This is “post event” analysis because it is not
happening in real-time
• Log analysis is looking for
Signs of trouble
Evidence that can be used to prosecute
• If you log it, read and use it!
• Resources
http://www.counterpane.com/log-analysis.html
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 77
Security = Tools Implementing Policy
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 78
The Threat Forecast
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 79
Conclusions
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 80
Security Resources at Cisco
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 81
Security Resources on the Internet
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 82
Thank You
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 83
Questions
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 84
Recommended Reading
Designing Network
Security, Second Ed.
ISBN: 1587051176
Available in Oct 2003
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 85
Recommended Reading
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 86
Recommended Reading
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 87
SEC-1000
8020_05_2003_c2 © 2003, Cisco Systems, Inc. All rights reserved. 88