The document discusses various types of gateways, including circuit level and application level gateways, focusing on their security functions and configurations. It highlights the advantages and disadvantages of these gateways, emphasizing the importance of security layers and monitoring for potential threats. Additionally, it covers misuse detection and anomaly detection systems, detailing their roles in network security management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
18 views14 pages
Unit 4 NIS
The document discusses various types of gateways, including circuit level and application level gateways, focusing on their security functions and configurations. It highlights the advantages and disadvantages of these gateways, emphasizing the importance of security layers and monitoring for potential threats. Additionally, it covers misuse detection and anomaly detection systems, detailing their roles in network security management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
ackef-
ssource Tp address
=Theap. addvess of the 37s
—osiieation) Bp address: a
Source aod deine en He —feons pat level adress:
The _jrensp st level
pork number Teper udp a deine, oppress)
; — _
eee Packet V
“Detemet Oo Tiuering eee)
= Bur Caw!
mes
T
. eas ee ee
Yq: packel Fiteving Rewkey~Cireutt level Gateway:
= : T civeutt Level Gatun does no pee’
an end tend) Tep_Cnnectien. “eather [the Gateway
Sets up two TCp__Cnnecions , one between thse
and a “rep _useT @O_ inner host and one between
itself and GO Tep user of outer host .
= ances the +wo Connections axe established the gatewa)
ty ptesltt “elays Tey Sty ments fram one Ganeef ter}
ce the other witht eXem ining the Cntenks -
~The securtty — buncten Spots deteenining uhtch
Coamectens ust) be aljene
~ A dy pfeal use of ctraurt level Gateway fs 4d
eid
uation tn which the System almmntsrater teusts
the inter nat} Users .
= The Gatewoy can be cokrqured +s Surpert applet,
Nevel_ og phicy geevtce ot) Inbound Goneclfons
and eheeutt TTevel junckens bre cutharn A
nections - \
7 Sete RY Gans y
oursid £ ine
ae ae
outerde Has T ae CP ae _ =
nV
Pend Sever
exe} (teste
Contacts =the
gutn as
asks “fheha oes Conta chs the app least
on the wemote host ahd welays Top
Sepmenks ‘Containing, the app licotien lata
Laweer, the two endl pein
~ —Appltcstion leve] gatway 5 Band fo be move
secure than packet: Li hers .
=e a Isiieagy un deg and aude al] INComeng
tebhic at Lhe application level . I
~-t prime disadvnthe fs the addtifena]
sctssing over hen on) each conneck ef) -
—figpltetierteve| >
Gakwe:
outstel € ane eee
ennecks) connection | >
Sir. 7
outside Hest— " (antt Ssid Hes
iy: —Applrertin Level Gafeway
|
~fidvan to4 ¢— y
= ser has high secuty then’ packe}
Yering ‘ :
— St tae) deq and audit every Ineoming
shattic ! ss ! a
—Disedvamtoyes :
—ite sate shaud examine.
and berared any shablic th beth drrecttens
be2 Scene ot Recoil hue Hoel fect
veened host
——F2_dusome the disadvantage of a:
trewe || single timed basiien Galayu atten, anether
conbty uration fs available Fnewn as paced
Host btrewdl| Dual -—tomed Bastien - |
— cen this Wee ob Gnktguvation , the direct cnnecttins
Vetween the fntenal hess and the packer Miter
axe avetded :
— Here, “rhe packet Eerie Connects onty te the appli
qahway, which in fur has 4 deperete Connection:
with Hhe inteenal hests- : !
—_ Hense, tk packet Ketter Zs Successbuily atkeked
then onl? applfcrdier) gateway is visibie + the
anackey | at wil povide | secutiy t: Tntesna| |
hests- a f |
M1
o : T
t
Fipniiertier) Gateway
HTTP [packet bre
rc
Tl STP [os me |
7
Er
| [-reuner]
tengl hetwedle
y
Fig: Sbual femal Bastien)3. Serened Suh : .
= is “This type ok cenkr
ye yee:
guroten, bles hiphnst oteudiy amen the pest
ble anktquratiery: at ipa] = aa
TE Kg “im preve versto) over al| the availthe —~T
scheme of biewal) Cnbiquretton |
= T+ uses wo packet” fiijers one between
the innet intebe and applratie) qatevoy
and fhe inienal new. Ee
= ~Thas +his Conbrauration achive 3 levels of
‘Steurtty bev an aywoker + break into
ae PE Eg heya gateway
+} tnt | socket fer
I SMTP. |
=| 7 ft of
= Aacket, TELNET}
- Iiveing ]
| Lo i Tate onal hetwerk
a7 2
Bij: Sweened Subnet Firewall]Linijele
b smuieHien|s«
1b. Frewai Sek preted) ageinsp
> = { Toside theeet 5
2_Packe Ler Brvewa)) does nok Pevide anf enka
= iHerin 9 7
Svea]
3 Protect. dunnieling ie Send; deta i
t s i HE Sending daty brem one
Fee] taother Soojuce) which neyates He
: Purpose ok Frewall
4 En cpie bea kite Cannot be examine’ and dilser -
Dmz:
Tt iS 4 Comprier fi
inserted as 4 "neutral zone"
est oF Smal] network
iN a Companys _pritere.
Network - “eb }
= aveids outside Usets From acting dirck access
ta Companyis deta servers 7
A_2m2 35 lan opHend| but mere secure appreach
theg Freeway Te Gan ekbectivey ack as pox
server” i ifs
= The ty tieal Mz Cenbiyuratien has g Seperate Cmp-
uier ov hist. Ina nehoork, which -raeetes request
om users within the private neboryk ote access
q website o gublic nepwor .
~The pmz_host- "tneHates Session box each requests
on the public netuork but is nef able + inthate
q Stsstoy back inte the _gvvale Newark. Tran
only hoc word packets whrch "Tas been Brg useted
by | host u prvale/ Thier
I public| Exteena hy Dal Reseurees
Jo
Epes oe 13
I l |
SAT FRE J Urt PY
i nena)
ew \) bivewd |Advantage .
“The main bent ob a ome fs
povide an intemal pj with on addzitera|
Steuvity layer by westricHing access " sensi
ive date and sevens
i
what is Test
afin _inteusten cetectie System Ts
q_device that monttes gq +tabbic ber pmalict—
ous aekviy os 4elicy vielsken and send
alert on I detector r ‘ ;
Yulnerability Assesmenf-: S
~ / Vunevabtlaey —assement—
is examining the Stete ob netucbk Seantty_
= Data abaut en | ports slo mpackage ~yuaning
T T : =]
network | -fopoleqy Netcare Glected an
ef Jepviovttield the List of viunevabilities.
~ \junevabilfey assesment needs te be.
Lipdated [seq last) te Nendie new thraks
=o Seourity. I
ao Misuse tection :
— \ Misuse. detection Jo Caljed!
— signature detecteQ in an apreeach” in which
a4 ahecK Pattern ov unguthevized and,
— Susticeus be vices Are Jeomned based of
Fe past activities and then the Knouteda ¢
es Thou the. feared = pattens is used +
detect ev predict | subsequent simijqy
ee | such patter {h_q O{w.track — Siq nature may Grin ne ok Tareed Soqig
Ae_sensttive host. | bis in rp addass + :
—
=
= publer_overbiew axfack
Anomaly Deletion : :
C— ma ' 5
L—
Ay anomly Detection System) __
unseel) "aHacks
has the abiliry deck new and
subs ntial
cin _aeaise an _eavly alewary bebere_an
damaye, de network Could be dene. by the atack
}
Hest cone aps:
Host Inbansen Detection system
F hess or device on dhe nlw
the Ingmtay — od outgoing
wil] der
uns oN independ eu
— A HTns _ meniters
Yeo the device eal
packet s
the admintsraty 1 _ maltctouls noite ts
detected. [
Lates | Larabee)
Trea bbic Ane lysis (sey
colject | enghne interlace /
| '
| L
T Loy aye -Meram | of Repos)
Hires Storage
Ea: Componcats ob Het Based TS
a snapshot ob existing Systen)
— Th Sasi tekes }
Ht with the evils
fies and Compares?
ieyatipg latrines| Pago No. p
Dato |
Le
Cd ——
5 = tb The analytics) sysier bijes were ed th :
q ox deleted oq alert ts sent fo the
ra Adminishatear fo investyate.
o> An ex of prps usaqe cn be seen of
mis sten Gea! machines, whrch ave
ot expected fo change —thete [ey out
——fssic_Cripenents oper ps :
7 Tra Vic Caliech oe 4
“This Component G@llechS _acti-
MY ee events fom the "ps + examine
On Host based rps this can be dog Files
4 audtt Megs oy fabic aming te oF
leaving Q specibre SY stem.
froalysis Engine +
+
“This Compenet examines
the Collected O) -brabkic ‘and Compares Tt
¥
EL te known patties of malrofous factviry
es Ste in the Stynatur database. 7
he Analy sis engine acs like 4 berg
4 ok the Tos.
> Signature Database:
= Te Ps q_Gliection of
+ pattens and dekinatiins of Enewn malfeiaas
+ Tachvity.
+ T
+ User Tnterbace S pepertin
4
thes the _Cmpenenk-
4
Hat totes beces with human elemehty
beovicing alters and giving the usera
q rorane tot Interact with W<- operate thes.
—-r— Network Based. musi Deleaier: Geter.
= Natwok based “rps Kecuce.s “on ; net a ~ feva bie
__wthe Lths ane Ly tes: : revelling r the cabies
an wives that Intercennect J the System.
= A nebwork tbs Sheud check the jw fPatbic
s when it passes and ft ts able te onal~ze.
yale dccerding te pectee) pe -omeunt
destimatray ete: —
eee CS
Gewrce
Networ) dase rps shots ber ccefatn ach
ite “pentl of service | 2 :
post SCANS ! iz ;
lice Content in the det patie
ok a packet
crafan hers ancl worms
Brute force attec kK
Sig nota
age Coyanens $f network ros—___Heney_ peices ie
eae oh ae ee Aten
Sep _eNgaye ond device hackers and Se
maltcioug “Activities » over he:
Totem ef - —_———
~The heney pots are feed +e do He following
3 Piver4’ “the aHlenlien ob potential] 4
AHacker.
at 2. Cliect inkrmatery abot the intra dex’s a
Le chien. a
J a. poovide encugerement- fe the ohackew
J -
+ se/as te stay” bor seme time atilewirng
Fe | the admin sHeatar fe -delefe- Hts and
ba silt act on this. i |
—_=_teneypets ave designed her 2 Amperfent- goals ~
a 4 roke Them steok = Hike hay veal like
a Sy stenos:
g 2: De not qjjow (eq Himate uses fo
know about % access hem.
Webstever—
t } beeper)
;
Detwer
~
Tatesnet
pivewd |}