The document discusses various types of information security devices that filter network traffic at the application layer. It describes application firewalls, which perform stateful protocol analysis to identify deviations from protocol standards. It also covers application proxy gateways, which require all traffic to pass through a proxy agent, allowing deeper content inspection. Finally, it mentions dedicated proxy servers and web application firewalls, which provide specialized filtering of specific services like HTTP.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
147 views33 pages
Module-1: Information Security Devices
The document discusses various types of information security devices that filter network traffic at the application layer. It describes application firewalls, which perform stateful protocol analysis to identify deviations from protocol standards. It also covers application proxy gateways, which require all traffic to pass through a proxy agent, allowing deeper content inspection. Finally, it mentions dedicated proxy servers and web application firewalls, which provide specialized filtering of specific services like HTTP.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 33
Module-1
Information Security Devices
Application Firewall • Application firewall (AF) devices perform a stateful protocol analysis of the application layer. • They support numerous common protocols, such as http, sql, e-mail service (smtp, pop3 and imap), voip and xml. • Stateful protocol analysis relies on predefined profiles of acceptable operating modes for the selected protocol, enabling the identification of potential deviations and irregularities in the message flow of the protocol through the device. • Problems may arise if there is a conflict between the operating mode of a specific protocol, which is defined on the AF device, and the way in which the protocol is implemented in the specific version of the application or of the operating systems used in the network. Application Firewall • The stateful protocol analysis can: Determine whether an e-mail message contains a type of attachment that is not allowed (e.G. Exec files); Determine whether instant messaging is used via an HTTP port; Block the connection through which an unwanted command is executed (e.G., An FTP put command on the FTP server); Block access to a page with unwanted active content (e.G., Java); identify an irregular sequence of commands exchanged in the communication between two hosts (e.G., An unusually large number of repetitions of the same command or the use of a command before using the command it depends on); Application Firewall • Enable the verification of individual commands and the minimum and maximum length of appropriate command-line arguments (e.g., The number of characters used in a username). • An AF device cannot detect attacks that meet the generally acceptable procedures of operation of a specific protocol, such as DoS (denial of service) attacks caused by the repetition of a large number of acceptable message sequences in a short time interval. • Due to the complexity of the analysis they perform, and the large number of concurrent sessions they monitor, the main disadvantage of the method of stateful protocol analysis is the intensive use of AF devices. Application Proxy Gateway • Application proxy gateway (APG) devices also perform an analysis of the traffic flow on the application layer. • Compared to AF devices, APG devices provide a higher level of security for individual applications since they never allow a direct connection between two hosts, and they can perform an inspection of the content of application-layer messages. • APG devices contain so-called proxy agents or “intermediaries” in the communication between two end hosts. • In this way, they prevent direct communication between them. • Each successful connection between the end hosts consists of two connections – one between the client and the proxy server and the other between the proxy server and the destination device. Application Proxy Gateway • Based on the filtering rules defined on the APG device, proxy agents decide whether network traffic will be allowed or not. • Traffic-filtering decisions can also be made based on the information contained in the header of an application-layer message or even based on the content conveyed by that message. In addition, proxy agents can require user authentication. • There are also APG devices with the capability of packet decryption, analysis and re-encryption, before a packet is forwarded to the destination host. • Packets that cannot be decrypted are simply forwarded through the device. Application Proxy Gateway • Another deficiency of these devices is the limitation in the number of services that can be filtered through them. • Each type of traffic passing through the device requires a specific proxy agent that acts as an intermediary in the communication. Consequently, APG devices do not always support the filtering of new applications or protocols. • Due to their price, apg devices are commonly used for protecting data centres or other networks containing publicly available servers that are of high importance to an organisation. • In order to reduce the load on apg devices and achieve greater efficiency, modern networks more frequently use proxy servers (dedicated proxy servers) that are dedicated to specific services that are not so sensitive to time delays (e.g., Email or web proxy servers). Dedicated Proxy Server • Like APG devices, dedicated proxy (DP) servers also have a role as “intermediaries” in the communication between two hosts, although their traffic-filtering capabilities are significantly lower. • This type of device is intended for the analysis of the operation of specific services and protocols (e.g., HTTP or SMTP). Due to their limited traffic-filtering capabilities, DP devices are deployed behind firewall devices in the network architecture. • Their main function is to perform specialized filtering of a specific type of traffic (based on a limited set of parameters) and carry out the logging operation. • The execution of these specific activities significantly reduces Dedicated Proxy Server • The most widely used devices of this type are web proxy servers. A common example of their use is an HTTP proxy server (placed behind the firewall device or router), to which users need to connect when they wish to access external web servers. • If an institution has an outgoing connection (uplink) of lower bandwidth, the use of the caching function is recommended in order to reduce the level of traffic and improve the response time. Dedicated Proxy Server • As a result of an increase in the number of available web applications and the number of threats transferred through the HTTP protocol, web proxy servers are growing in significance. • Consequently, many equipment manufacturers today add the functionality of various firewall technologies to the standard web proxy servers, thus increasing their traffic-filtering capabilities. Web application firewall (WAF) • Web application firewalls are built to provide web applications security by applying a set of rules to an HTTP conversation. Because applications are online, they have to keep certain ports open to the internet. • This means attackers can try specific website attacks against the application and the associated database, such as cross-site scripting (XSS) and SQL injection. • While proxy firewalls generally protect clients, WAFs protect servers. Another great feature of WAFs is that they detect distributed denial of service (DDoS) attacks in their early stages, absorb the volume of traffic and identify the source of the attack. Solutions Combining Traffic Filtering with Other Technologies • In addition to their basic purpose of blocking unwanted traffic, firewall devices often combine their filtering functionality with other technologies, primarily routing. • It is the other way around with routers. • As a result, NAT (network address translation) is sometimes considered to be a firewall technology, although essentially it is a routing technology. • Other related functionalities, such as VPN and IDP, are often available on firewall devices. NAT (Network Address Translation) • NAT is a technology that enables devices that use private IP addresses to communicate with devices on the internet. This technology translates private IP addresses, which can be used by devices within a local area network (LAN), into publicly available internet addresses. • The application of NAT technology may limit (intentionally or unintentionally) the number of available services, i.e., It may disable the functioning of the services that require direct, end- to-end connectivity (e.g., Voip). • There are three types of NAT translations: – dynamic, – static and – PAT. Dynamic NAT • Dynamic NAT uses a set of publicly available IP addresses, successively assigning them to hosts with private IP addresses. • When a host with a private IP address needs to communicate with a device on the internet, dynamic NAT translates its private IP address into a publicly available IP address, by taking the first available IP address from a defined pool of publicly available IP addresses. • Dynamic NAT is suitable for client computers. Static NAT • It provides one-to-one mapping between the private IP address of a host and the public IP address assigned to it. In this manner, the host with a private IP address always appears on the internet with the same public IP address. • This is the main difference between static and dynamic translation. Static NAT is suitable for servers. • In both types of translation mentioned above, each private IP address is translated into a separate, public IP address. • In order to support a sufficient number of simultaneous user sessions, an organisation using dynamic and/or static NAT needs to have a sufficient number of public IP addresses. PAT • (Port address translation or so-called NAT overload) performs mapping between several private IP addresses and one or more public IP addresses. The mapping of each private IP address is performed by way of the port number of the public IP address. • PAT translation ensures that each client on a LAN that establishes a connection with a device on the internet is assigned a different port number of the public IP address. • The response from the internet, which comes as a result of the request, is sent to the port from which the request was forwarded. • In this manner, a device that performs the translation (a router, firewall or server) knows to which host from the LAN it should forward the packet. Proxy server • Proxy servers act as negotiators for requests from client software seeking resources from other servers. • A client connects to the proxy server and requests some service (for example, a website); the proxy server evaluates the request and then allows or denies it. • Most proxy servers act as forward proxies and are used to retrieve data on behalf of the clients they serve. Proxy server • In organizations, proxy servers are usually used for traffic filtering (web filters) and performance improvement (load balancers). Proxy server • Web filter – Web filters prevent users’ browsers from loading certain pages of particular websites. – URL filtering involves blocking websites (or sections of websites) based solely on the URL, restricting access to specified websites and certain web-based applications. – This is in contrast to content filtering systems, which block data based on its content rather than from where the data originates. Proxy server • Web filter – Microsoft, for example, implemented a phishing filter, which acted as a URL filter for their browser, and then replaced it with the SmartScreen filter, which runs in the background and sends the address of the website being visited to the SmartScreen filter server, where it is compared against a list that is maintained of phishing and malware sites. – If a match is found, a blocking web page appears and encourages you to not continue. Proxy server • Web filter – Web filter appliances have additional technologies to block malicious internet web sites. – They have a database of malware sites but also you can create your own list or policy of blocked web sites. – You can apply site whitelisting or blacklisting, see every user’s full web site history, inspect cached pages, and even detect the amount of downloaded traffic. – Analyzing this information will help you to understand how your users work on the internet and what their interests are, so it can be a great advantage in insider threat prevention. Proxy server • Network load balancer (NLB) – Load balancers are physical units that direct computers to individual servers in a network based on factors such as server processor utilization, number of connections to a server or overall server performance. – Organizations use load balancers to minimize the chance that any particular server will be overwhelmed and to optimize the bandwidth available to each computer in the network. – A load balancer can be implemented as a security software or hardware solution, and it is usually associated with a device — a router, a firewall, a network address translation (NAT) appliance and so on. Proxy server • Network load balancer (NLB) – A load balancer splits the traffic intended for a website into individual requests that are then rotated to redundant servers as they become available. – A key issue with load balancers is scheduling — determining how to split up the work and distribute it across servers. Proxy server • Network load balancer (NLB) – There are several load balancing methods: • Round-robin • Affinity • Least connection • Agent-based adaptive load balancing • Chained failover • Weighted response time • Software-defined networking Proxy server • Network load balancer (NLB) – Round-robin • The first client request is sent to the first group of servers, the second is sent to the second, and so on. When it reaches the last group of servers in the list, the load balancer starts over with the first group of servers. Proxy server • Network load balancer (NLB) – Affinity • Affinity minimizes response time to clients by using different methods for distributing client requests. It has three types: – No affinity — NLB does not associate clients with a particular group of servers; every client request can be load balanced to any group of servers. – Single affinity — NLB associates clients with particular groups of servers by using the client’s IP address. Thus, requests coming from the same client IP address always reach the same group of servers. – Class C affinity —NLB associates clients with particular groups of servers by using the Class C portion of the client’s IP address. Thus, clients coming from the same Class C address range always access the same group of servers. Proxy server • Network load balancer (NLB) – Least connection — This method takes the current server load into consideration. The current request goes to the server that is servicing the least number of active sessions at the current time. – Agent-based adaptive load balancing — Each server in the pool has an agent that reports on its current load to the load balancer. This real time information is used when deciding which server is best placed to handle a request. – Chained failover — The order of servers is configured (predefined) in a chain. Proxy server • Network load balancer (NLB) – Weighted response time — Response information from a server health check is used to determine which server is responding the fastest at a particular time. – Software-defined networking — This approach combines information about upper and lower networking layers. This allows information about the status of the servers, the status of the applications running on them, the health of the network infrastructure, and the level of congestion on the network to all play a part in the load balancing decision making. Spam filter • A mail gateway can be used not only to route mail but to perform other functions as well, such as encryption or, to a more limited scope, DLP. • More commonly, spam filters can detect unwanted email and prevent it from getting to a user’s mailbox. Spam filters judge emails based on policies or patterns designed by an organization or vendor. • More sophisticated filters use a heuristic approach that attempts to identify spam through suspicious word patterns or word frequency. Spam filter • The filtering is done based on established rules, such as blocking email coming from certain IP addresses, email that contains particular words in the subject line, and the like. • Although spam filters are usually used to scan incoming messages, they can also be used to scan outgoing messages to help identify internal PCs that might have contracted a virus. VPN (virtual private network) • VPN (virtual private network) technology is used to increase the security of data transfer through a network infrastructure that does not provide a sufficient degree of data security. • It enables the encryption and decryption of network traffic between external networks and an internal, protected network. • VPN functionality can be available on firewall devices or implemented on VPN servers that are placed behind firewall devices in the network architecture. • In many cases, the implementation of VPN services on a firewall device itself is the most optimal solution. VPN (virtual private network) • Placing a VPN server behind the firewall device requires the VPN traffic to pass through the firewall device in an encrypted form. • As result, the firewall device cannot perform an inspection, access control or logging of the network traffic, and therefore cannot scan it for certain security threats. • However, regardless of the place of the implementation, the VPN service requires the application of certain filtering rules of the firewall device in order to enable its uninterrupted operation. • Accordingly, special attention should always be paid to making sure that the appropriate protocols and the TCP/UDP services that are necessary for the functioning of the chosen VPN (virtual private network)