0% found this document useful (0 votes)
47 views87 pages

Unit - 4 Remaining Topics

The document discusses security monitoring and firewall architectures. It covers firewall design principles, characteristics, environments like DMZ, and types of firewall configurations including screened host and screened subnet. Intrusion detection systems, log files, and honeypots are also mentioned.

Uploaded by

Nivedhitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views87 pages

Unit - 4 Remaining Topics

The document discusses security monitoring and firewall architectures. It covers firewall design principles, characteristics, environments like DMZ, and types of firewall configurations including screened host and screened subnet. Intrusion detection systems, log files, and honeypots are also mentioned.

Uploaded by

Nivedhitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 87

Security monitoring and Auditing

Architecture Diagram
Security Requirements
Specifications
Firewalls
Introduction
• Firewalls control the flow of network traffic
• Firewalls have applicability in networks where
there is no internet connectivity
• Firewalls operate on number of layers
• Can also act as VPN gateways
• Active content filtering technologies
Firewalls
• Effective means of protection a local system or
network of systems from network-based
security threats while affording access to the
outside world via WAN`s or the Internet
Firewall Design Principles

• Information systems undergo a steady


evolution (from small LAN`s to Internet
connectivity)
• Strong security features for all workstations
and servers not established
Firewall Design Principles

• The firewall is inserted between the premises


network and the Internet
• Aims:
– Establish a controlled link
– Protect the premises network from Internet-based
attacks
– Provide a single choke point
Firewall Characteristics

• Design goals:
– All traffic from inside to outside must pass through
the firewall (physically blocking all access to the
local network except via the firewall)
– Only authorized traffic (defined by the local
security police) will be allowed to pass
Firewall Characteristics

• Design goals:
– The firewall itself is immune to penetration (use of
trusted system with a secure operating system)
Firewall Characteristics

• Four general techniques:


• Service control
– Determines the types of Internet services that can
be accessed, inbound or outbound
• Direction control
– Determines the direction in which particular
service requests are allowed to flow
Firewall Characteristics

• User control
– Controls access to a service according to which
user is attempting to access it
• Behavior control
– Controls how particular services are used (e.g.
filter e-mail)
Firewall Environments
• There are different types of environments
where a firewall can be implemented.
• Simple environment can be a packet filter
firewall
• Complex environments can be several
firewalls and proxies
DMZ Environment
• Can be created out of a network connecting
two firewalls
• Boundary router filter packets protecting
server
• First firewall provide access control and
protection from server if they are hacked
DMZ ENV
VPN
• VPN is used to provide secure network links
across networks
• VPN is constructed on top of existing network
media and protocols
• On protocol level IPsec is the first choice
• Other protocols are PPTP, L2TP
VPN
Intranets
• An intranet is a network that employs the
same types of services, applications, and
protocols present in an Internet
implementation, without involving external
connectivity
• Intranets are typically implemented behind
firewall environments.
Intranets
Extranets
• Extranet is usually a business-to-business
intranet
• Controlled access to remote users via some
form of authentication and encryption such as
provided by a VPN
• Extranets employ TCP/IP protocols, along with
the same standard applications and services
Types of Firewalls

• Three common types of Firewalls:


– Packet-filtering routers
– Application-level gateways
– Circuit-level gateways
– (Bastion host)
Types of Firewalls

• Packet-filtering Router
Types of Firewalls

• Packet-filtering Router
– Applies a set of rules to each incoming IP packet
and then forwards or discards the packet
– Filter packets going in both directions
– The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP header
– Two default policies (discard or forward)

Henric Johnson 70
Types of Firewalls

• Advantages:
– Simplicity
– Transparency to users
– High speed
• Disadvantages:
– Difficulty of setting up packet filter rules
– Lack of Authentication
Types of Firewalls

• Possible attacks and appropriate


countermeasures
– IP address spoofing
– Source routing attacks
– Tiny fragment attacks
Types of Firewalls

• Application-level Gateway

Henric Johnson 73
Types of Firewalls

• Application-level Gateway
– Also called proxy server
– Acts as a relay of application-level traffic
Types of Firewalls

• Advantages:
– Higher security than packet filters
– Only need to scrutinize a few allowable
applications
– Easy to log and audit all incoming traffic
• Disadvantages:
– Additional processing overhead on each
connection (gateway as splice point)
Types of Firewalls

• Circuit-level Gateway
Types of Firewalls

• Circuit-level Gateway
– Stand-alone system or
– Specialized function performed by an Application-
level Gateway
– Sets up two TCP connections
– The gateway typically relays TCP segments from
one connection to the other without examining
the contents
Types of Firewalls

• Circuit-level Gateway
– The security function consists of determining
which connections will be allowed
– Typically use is a situation in which the system
administrator trusts the internal users
– An example is the SOCKS package
Types of Firewalls

• Bastion Host
– A system identified by the firewall administrator as
a critical strong point in the network´s security
– The bastion host serves as a platform for an
application-level or circuit-level gateway
Firewall Configurations

• In addition to the use of simple configuration


of a single system (single packet filtering
router or single gateway), more complex
configurations are possible
• Three common configurations
Firewall Configurations

• Screened host firewall system (single-homed


bastion host)

Henric Johnson 81
Firewall Configurations

• Screened host firewall, single-homed bastion


configuration
• Firewall consists of two systems:
– A packet-filtering router
– A bastion host
Firewall Configurations

• Configuration for the packet-filtering router:


– Only packets from and to the bastion host are
allowed to pass through the router
• The bastion host performs authentication and
proxy functions
Firewall Configurations

• Greater security than single configurations


because of two reasons:
– This configuration implements both packet-level
and application-level filtering (allowing for
flexibility in defining security policy)
– An intruder must generally penetrate two
separate systems
Firewall Configurations

• This configuration also affords flexibility in


providing direct Internet access (public
information server, e.g. Web server)
Firewall Configurations

• Screened host firewall system (dual-homed


bastion host)
Firewall Configurations

• Screened host firewall, dual-homed bastion


configuration
– The packet-filtering router is not completely
compromised
– Traffic between the Internet and other hosts on
the private network has to flow through the
bastion host
Firewall Configurations

• Screened-subnet firewall system


Firewall Configurations

• Screened subnet firewall configuration


– Most secure configuration of the three
– Two packet-filtering routers are used
– Creation of an isolated sub-network
Firewall Configurations

• Advantages:
– Three levels of defense to thwart intruders
– The outside router advertises only the existence of
the screened subnet to the Internet (internal
network is invisible to the Internet)
Firewall Configurations

• Advantages:
– The inside router advertises only the existence of
the screened subnet to the internal network (the
systems on the inside network cannot construct
direct routes to the Internet)
IDS, Log Files, HoneyPots
Overview
• Motivation
• What are Honeypots?
– Gen I and Gen II
• The GeorgiaTech Honeynet System
– Hardware/Software
– IDS
– Logging and review
• Some detected Exploitations
– Worm exploits
– Sage of the Warez Exploit
• Words of Wisdom
• Conclusions
Why Honeynets ?

An additional layer of security


Security: A serious Problem

Firewall IDS

A Traffic Cop Detection and Alert


Problems: Problems:
Internal Threats False Positives
Virus Laden Programs False Negatives
The Security Problem

Firewall IDS

HoneyNets

An additional layer of security


Properties
• Captures all inbound/outbound data
• Standard production systems
• Intended to be compromised
• Data Capture
– Stealth capturing
– Storage location – away from the honeynet
• Data control
– Protect the network from honeynets
Two types
Gen I Gen II

Good for simpler attacks Sophisticated Data Control : Stealth


Unsophisticated targets Fire-walling
Limited Data Control

Gen I chosen
GATech Honeynet System
Huge network

4 TB data processing/day

CONFIG Sub-standard systems

Open Source Software

Simple Firewall Data Control


IDS
Invisible SNORT Monitor

Promiscuous mode

Two SNORT Sessions

Session 1 Signature Analysis Monitoring

Session 2 Packet Capture DATA CAPTURE


Data Analysis

SNORT DATA CAPTURE

Requires human resources All packet logs stored

One hour daily ! Ethereal used

Forensic Analysis
Detected Exploitations

16 compromises detected

Worm attacks Hacker Attacks


DETECTING WORM EXPLOITS
Honey Net traffic is Suspicious

Heuristic for worm detection:


Frequent port scans

Specific OS-vulnerability monitoring possible

Captured traffic helps signature development


SAGA of the WAREZ Hacker

Helped locate a compromised host


Honeynet

Very difficult to detect otherwise ! IIS Exploit  Warez Server


+ Backdoor
Words of Wisdom
• Start small
• Good relationships help
• Focus on Internal attacks
• Don’t advertise
• Be prepared to spend time
Conclusion
• Helped locate compromised systems
• Can boost IDS research
– Data capture
• Distributed Honey nets ?
• Hunting down Honeypots
– http://www.send-safe.com/honeypot-hunter.php
Discussion
• The usefulness of the extra layer ?
• Dynamic HoneyNets
• Comparison with IDS: are these a replacement
or complementary ?

HONEY IDS
NET
IDS vs HoneyNet
• IDS – primary function is detection and
alerting
• Honeynets – use IDS to detect and alert
– but nothing is done to control the
threat
– Primary intent is to log and capture effects
and activities of the threat

Honeynets do not protect the network – they


have protection as a benefit, not intent

You might also like