Lecture 3 - Network Security Techniques
Lecture 3 - Network Security Techniques
1
Network security techniques
These are techniques designed to address issues
of network security. They can be implemented as
hardware or software and include:
•Firewalls
•Intrusion Detection Systems (IDS)
•Virtual Private Networks (VPN)
•Anti-virus
•Cryptography
2
1) Firewalls
•A firewall is a system designed to prevent unauthorized access to
(or from) a private network.
•Firewalls can be implemented in either hardware or software, OR
a combination of both.
•Firewalls can be an effective means of protecting a local system
from network-based security threats
•All messages entering or leaving the intranet pass through the
firewall, which examines each message and blocks those that do
not meet the specified security criteria.
•Features include logging and reporting, automatic alarms at given
thresholds of attack, and a graphical user interface for controlling
the firewall.
3
Firewall Limitations
a)Cannot protect against internal threats
– E.g. disgruntled employees who then cooperate
with an attacker
b) It cannot protect against attacks that bypass
the firewall,
- E.g. PCs with dial-out capability to an ISP, or dial-in
modem pool use
c) Cannot protect against transfer of all virus
infected programs or files
– because of huge range of O/S & file types
4
Firewalls
• A firewall is a system that typically sits at some point of
connectivity between the site it protects and the rest of the
network.
• It is usually implemented as an “appliance” or part of a router,
although a “personal firewall” may be implemented on an end
user machine.
• Firewall-based security depends on the firewall being the only
connectivity to the site from outside; there should be no way to
bypass the firewall via other gateways, wireless connections,
or dial-up connections.
5
Firewalls
• In effect, a firewall divides a network into a more-trusted zone
internal to the firewall, and a less-trusted zone external to the
firewall.
• This is useful if you do not want external users to access a
particular host or service within your site.
• Firewalls may be used to create multiple zones of trust, such as
a hierarchy of increasingly trusted zones.
• A common arrangement involves three zones of trust: the
internal network; the DMZ (“demilitarized zone”); and the rest
of the Internet.
6
Firewalls
A firewall filters packets flowing between a site and the rest of the Internet
7
Types of firewalls
a) Packet filter: Looks at each packet entering or leaving the
network and accepts or rejects it based on user-defined rules.
Packet filtering is fairly effective and transparent to users, but it
is difficult to configure. It is susceptible to IP spoofing.
9
Attacks on Packet Filters
a) IP address spoofing where intruder transmits packets
from the outside with internal host source IP address
(fake source IP address)
b) Source routing attacks: where source specifies the
route that a packet should take in order to bypass
security measures. (Discard all source routed packets )
• Attacker sets a route other than default
– block source routed packets
c) Tiny fragment attacks – write notes
10
Firewalls – Packet Filters
12
b) Application Level Gateway contd...
• How a proxy works
– user requests service from proxy
– proxy validates request as legal
– then actions request and returns result to user
• Application-level gateways tend to be more secure
than packet filters, & can log and audit traffic at
application level
13
Proxy Firewall Example
Virus checking in electronic mail
• Incoming mail goes to proxy firewall
• Proxy firewall receives mail, scans it
• If no virus, mail forwarded to destination
• If virus, mail rejected or disinfected before
forwarding
14
Firewalls - Application Level Gateway (or Proxy)
16
De-militarized zone (DMZ)
18
Intrusion Detection
• Unusual traffic pattern is a sign of intrusion by a
hacker
• IDS are complementary to firewalls
• IDS detects activity once the intruder is on the system
19
Some of the benefits of IDS
a) Monitors the operation of firewalls, routers and files
critical to other security mechanisms
b) Comes with extensive attack signature database against
which information from the customer systems can be
matched
c) Allows administrator to tune, organize and comprehend
often incomprehensible operating system audit trails and
other logs
d) Non-Expert staff can perform security management
services via user-friendly interfaces
e) Can recognize and report alterations to data files
20
Firewall Vs IDS
• Firewall cannot detect security breaches associated
with traffic that does not pass through it.
• IDS is only aware of traffic in the internal network
• Firewall does not inspect the content of the
permitted traffic, simply grants or denies access
based on source & destination address
• Firewall is likely to be attacked more often than
IDS
• IDS is capable of monitoring messages from other
pieces of security infrastructure
21
Types of IDS
Signature-
Anomaly-based
based
Host-based
Network-
based 22
a) Signature-based IDS
• Characteristics
– Uses known pattern matching to signify attack
– It is signature based just like
Antivirus software
• Advantages
– Widely available
– Fairly fast
– Easy to implement
– Easy to update
• Disadvantages
– Cannot detect attacks for which it has no signature
23
b) Host-based IDS
• Characteristics
– Runs on single host
– Can analyze audit-trails, logs, integrity of files and
directories, etc.
• Advantages
– More accurate than NIDS
– Less volume of traffic so less overhead
• Disadvantages
– Deployment is expensive
– What happens when host get compromised?
24
Host-based IDS contd…
• Example of agent HIDS is Entercept’s product
• How HIDS works upon detecting an intrusion?
– Log (record) the event
– Alert the administrator
– Terminate the user login
– Disable the user account
• Host-based and network-based IDS are
complementary products
25
c) Network-based IDS
• Most commonly used IDS
• Location of IDS on the network is critical both to detect intrusion
as well as to be cost effective
• Typical locations are:
– Inside the firewall
– On the DMZ
– On network segments connecting mainframe to hosts
• Just inside the firewall is the best location because all inbound and
outbound traffic goes through that place
• DMZ is also a good location since the public enters the DMZ
only. If DMZ is attacked, an IDS there could potentially stop the
hacker at the DMZ.
• Locating the IDS on the server farm segment or the mainframe to
host segment is needed only in mission critical applications
26
NIDS contd…
• Network IDS have the capacity to check 40 Mb/sec of traffic.
If traffic exceeds this capacity, then IDS will miss packets at
random and could potentially let the wrong packet through.
• An IDS monitors and detects network attacks or misuses in real
time
• Most of network-based systems are based on predefined attack
signatures--signatures that will always be a step behind the
latest underground exploits
• Provide better security against DoS attacks
• Have difficultés in sustaining networks with a very large
bandwidth
27
d)Anomaly-based IDS
• Characteristics
– Uses statistical model or machine learning engine to detect
intrusions
– Recognizes departures from normal as potential intrusions
• Advantages
– Can detect attempts to exploit new and unforeseen vulnerabilities
– Can recognize authorized usage that falls outside the normal pattern
• Disadvantages
– Generally slower, more resource intensive compared to signature-
based IDS
– Greater complexity, difficult to configure
– Higher percentages of false alerts
28
False positives and false negatives
a) False positives - happen when an IDS mistakenly
identifies an invalid packet as valid
• E.g. Network IDS have the capacity to check 40 Mb/sec of
traffic. If traffic exceeds this capacity, then IDS will miss
packets at random and could potentially let the wrong packet
through.
• False positives may require human intervention
• False positives are costly to fix
• To avoid false positives, the system needs tuning over a
period of time to monitor for the proper type of activity
b) False negatives – happen when an IDS mistakenly
identifies a valid packet as suspicious
29
Detection methods
• Passive detection
– Detects anomalous activity but does not stop
such activity
• Active detection
– Detects anomalous activity and stops such
activity
– Inter-operates with routers and firewalls
– When IDS is used to block malicious traffic, it is
called shunning or blocking
30
Task
a) As a computer security specialist at a local
university, write a report on the advantages of
honeypots at 3 possible locations
i) outside the firewall
ii) in the DMZ
iii) in the internal network
b) Suggest any useful ways in which an organization
can use honeypots.
31
Task
32
c) Virtual Private Networks
33
d)Anti-virus
34
e) Cryptography
35
Tutorial questions
1) Firewalls have been the mainstay of access control
that keep intruders out. However, backdoor entries into
firewalls are left. Explain how such backdoor entry points
are devised, why they are needed, what can be done to
minimize attacks through backdoor entries.
36
Tutorial questions contd…
For each question, briefly explain which type of firewall can be used
to defend against the attack and how the firewall should be
configured. (12 marks)
a) Prevent external users from exploiting a security bug in a CGI
script on an internal Web server (the Web server is serving
requests from the Internet).
b) Prevent an online password dictionary attack from the external
network on the Telnet port of an internal machine.
c) Block a virus embedded in an incoming e-mail.
d) Block users on the internal network from browsing a specific
external IP address.
e) Prevent from spoofing inside IP address.
f) Prevent attacks that are broken into multiple packets.
37