chp9 3
chp9 3
A private network is made up of com puters owned by a single organization, which share
information with each other.
Let us assume that an organization wants to connect two of its branch networks to each other. The
trouble is that these branches are located quite a distance apart. One branch is in Delhi and the
other branch is in Mumbai. Two solutions out of all the available ones seem logical:
• Connect the two branches using a personal network, i.e. lay cables between the two offices
your self or obtain a leased line between the two branches.
• Connect the two branches with the help of a public network, such as the Internet.
A VPN is a mechanism of employing encryp tion, authentication and integrity protection so that we
can use a public network (such as the Internet) as if it is a private network (such as a physical
network created and controlled by you). VPN offers high amount of security and yet does not
require any special cabling on behalf of the organization that wants to use it. Thus, a VPN combines
the advantages of a public network (cheap and easily available) with those of a private network
(secure and reliable).
A VPN is thus a mechanism to simulate a private network over a public network, such as the
Internet. The term virtual signifies that it depends on the use of virtual connections. These
connections are temporary and do not have any physical presence. They are made up of packets.
VPN Architecture
Suppose an organization has two networks, Network 1 and Network 2, which are physically apart
from each other and we want to connect them using the VPN approach. In such a case, we set up
two firewalls, Firewall 1 and Firewall 2.
Network Setup:
• Two networks, Network 1 and Network 2, are connected to the Internet via their respective
firewalls: Firewall 1 and Firewall 2.
• A VPN tunnel is established between these two firewalls to securely transfer data over the
Internet.
• It creates a secure, encrypted path between the two firewalls, allowing private
communication across a public network like the Internet.
Original Packet
o Sends the packet through the VPN tunnel over the Internet
o Developed by IETF
INTRUSION
No system is fully secure—intruders will always attempt to break in.They target both private (LAN)
and public (Internet) networks.Intruders and viruses are among the most common security threats.
(a) Masquerader: A user who does not have the authority to use a computer, but penetrates into a
system to access a legitimate user’s account is called as a masquerader. It is generally an external
user.
(b) Misfeasor: There are two possible cases for an internal user to be called a misfeasor:
• A legitimate user, who does not have access to some applications, data or resources
accesses them.
• A legitimate user, who has access to some applications, data or resources misuses these
privileges.
(c) Clandestine User: An internal or external user who tries to work using the privileges of a su
pervisor user to avoid auditing information being captured and recorded is called as a clandestine
user.
How do intruders try to attack? A simple example may be considered, where the attackers try to
obtain the passwords of legitimate users, so as to impersonate them. Some of the popularly known
methods of password guessing are as follows:
Audit Records:
One of the most important tools in intrusion detection is the usage of audit records, also called
audit logs. Audit records are used to record information about the actions of users. Traces of
illegitimate user actions can be found in these records, so as to detect intrusions so as to take
appropriate actions.
Audit records can be classified into two categories: Native audit records and Detection-specific audit
records.
(a) Native Audit Records All multi-user operating systems have accounting software built-in.
(b) Detection-specific Audit Records This type of audit records facility collects information
specific only to intrusion detection.
Intrusion Detection
Intrusion prevention is almost impossible to achieve at all times. Hence, more focus is on intrusion
detection. Following factors motivate efforts on intrusion detection:
(a) The sooner we are able to detect an intrusion, the quicker we can act. The hope of recovering
from attacks and losses is directly proportional to how quickly we are able to detect an intrusion.
(b) Intrusion detection can help collect more information about intrusions, strengthening the
intrusion prevention methods.
Honeypots
Modern intrusion detection systems make use of a novel idea, called as honeypots.
(a) Make them look like real-life systems. Put as much of real-looking (but fabricated) information
into them as possible.
Naturally, anyone trying to access a honeypot is a potential intruder. Honeypots are armed with
sensors and loggers, which alarm the administrators of any user actions.