RMC+MO+Data+&+Network+Security+10.2+ +Network+Security
RMC+MO+Data+&+Network+Security+10.2+ +Network+Security
Network Security
Section 10.2:
Network Security
Log in to the Cyber Range & open
both machines in the LCPS
Cyber exercise environment
Unit Learning Objectives
LAN
Border
Gateway
Second network firewall Network firewall to screen Router
to screen & block specific all inbound & outbound
traffic to & from the traffic. May allow traffic to
internal network that & from the public servers
needs to be allowed in the that should be blocked to
Host-based firewall on & from the internal
perimeter network.
individual devices. network.
Stateless Firewalls
LAN
Border
Gateway
Router
Section 10.2.4:
Intrusion Detection
Systems (IDS) &
Intrusion Prevention
Systems (IPS)
Intrusion Detection System
(IDS)/Intrusion Prevention
System (IPS)
• IDSs & IPSs are similar to a burglar alarm.
• They are both a type of software designed
to automatically caution administrators
when anyone is trying to breach through
the system using malicious activities.
– They detect the presence of any unwanted
intervention & alert the system
IDS vs. IPS
IDS IPS
● Detects potential intrusions & ● Detects potential intrusions &
alerts the system alerts the system
administrator administrator
● Does not do anything to ● Takes action to stop an
stop an attack that is in attack
progress ○ Resets a suspicious
connection
○ Blocks a suspicious IP
address
Typical Features of an IDS
or IPS
• Monitor & analyze user & system activities
• Perform auditing of system files & other
configurations, and the operating system
• Assess the integrity of system and data files
• Conduct analysis of patterns based on known
attacks
• Detect errors in system configuration
• Detect & caution if system is in danger
• An IPS will also try to stop the attack
Advantages of an IDS/IPS
• The network or computer is constantly monitored for any invasion or
attack.
• The system can be modified & changed according to the needs of the
client & can help outside & inner threats to the system & network.
• It can effectively prevent any damage to the network.
• It provides user friendly interface which allows easy security
management.
• Any alterations to files & directories on the system can be easily
detected & reported.
Signature-Based IDS/IPS
• Works on principle of
matching
• Data is analyzed & compared
with signature of known
attacks
– Advantage: it has more
accuracy & standard alarms
understood by user.
– Disadvantage: it won’t
detect new type of attack if
it doesn’t match signature
in database. BUS6302.64, 74, 83
Anomaly-Based IDS/IPS
• Also known as statistical or heuristic IDSs
• Builds statistical model of normal network
traffic (needs time to build this model)
– Bandwidth used
– Protocols defined for traffic
– Ports & devices that are part of the network
• Monitors network traffic & compares it to
statistical model
– Administrator alerted if anomaly or
discrepancy is detected
– Advantage: can detect new & unique attacks
BUS6302.64, 74, 83
Where are IDS’s/IPS’s
Installed?
• Network-Based
– Installed on perimeter of the network
• First device that sees incoming packets
• Last device that sees outgoing packets
– Large organizations often outsource this to third party vendors
• They have better visibility of attacks happening
• Have a scale advantage on tuning & response
• Have ability to update signature files on all clients at once
• Host-Based
– Usually only installed on specific high-value servers
– Monitors the operating system of host
Where are IDS’s
Installed?
Perimeter Network/
Internal Servers Public Servers Proxy
Demilitarized Zone Internet
(File share, (Web, mail, etc.) Server (DMZ)
Intranet databases, etc.)
LAN
Border
Gateway
Router
The IDS receives copy
of every packet coming
into the network.
Intrusion
Packets still deliver in Detection
the network. System
(IDS) BUS6302.64, 74, 83
Where are IPS’s
Installed?
Perimeter Network/
Demilitarized Zone
Internal Servers Internet
(File share, Public Servers Proxy (DMZ)
databases, etc.) (Web, mail, etc.) Server
Intranet
LAN
Border
Intrusion Gateway
The IPS intercepts Prevention Router
every packet coming System
(IPS)
into the network. IPS
blocks packets it
determines to be part
of an attack. BUS6302.64, 74, 83
Section 10.2.5:
Unified Threat
Management (UTM)
Devices
Unified Threat
Management (UTM) Device
• Appliance that is an all-in-one security device that allows the
network to be managed from one location
• Features normally on a UTM device:
– Anti-virus
– Anti-spyware
– Anti-spam
– Network firewall
– Intrusion detection & protection/prevention
– Content filtering (proxy server)
– Leak prevention
Unified Threat Management
(UTM) Device (continued)
Intranet
LAN
The UTM device is performing Border
Unified Gateway
some or all of the following Threat
functions: Router
Management
• Network Firewall (UTM) device
• Proxy Server
• IDS/IPS
• NAT
• Network-Based Antivirus
• Virtual Private Network (VPN)