Unit - 4 Remaining Topics
Unit - 4 Remaining Topics
Architecture Diagram
Security Requirements
Specifications
Firewalls
Introduction
• Firewalls control the flow of network traffic
• Firewalls have applicability in networks where
there is no internet connectivity
• Firewalls operate on number of layers
• Can also act as VPN gateways
• Active content filtering technologies
Firewalls
• Effective means of protection a local system or
network of systems from network-based
security threats while affording access to the
outside world via WAN`s or the Internet
Firewall Design Principles
• Design goals:
– All traffic from inside to outside must pass through
the firewall (physically blocking all access to the
local network except via the firewall)
– Only authorized traffic (defined by the local
security police) will be allowed to pass
Firewall Characteristics
• Design goals:
– The firewall itself is immune to penetration (use of
trusted system with a secure operating system)
Firewall Characteristics
• User control
– Controls access to a service according to which
user is attempting to access it
• Behavior control
– Controls how particular services are used (e.g.
filter e-mail)
Firewall Environments
• There are different types of environments
where a firewall can be implemented.
• Simple environment can be a packet filter
firewall
• Complex environments can be several
firewalls and proxies
DMZ Environment
• Can be created out of a network connecting
two firewalls
• Boundary router filter packets protecting
server
• First firewall provide access control and
protection from server if they are hacked
DMZ ENV
VPN
• VPN is used to provide secure network links
across networks
• VPN is constructed on top of existing network
media and protocols
• On protocol level IPsec is the first choice
• Other protocols are PPTP, L2TP
VPN
Intranets
• An intranet is a network that employs the
same types of services, applications, and
protocols present in an Internet
implementation, without involving external
connectivity
• Intranets are typically implemented behind
firewall environments.
Intranets
Extranets
• Extranet is usually a business-to-business
intranet
• Controlled access to remote users via some
form of authentication and encryption such as
provided by a VPN
• Extranets employ TCP/IP protocols, along with
the same standard applications and services
Types of Firewalls
• Packet-filtering Router
Types of Firewalls
• Packet-filtering Router
– Applies a set of rules to each incoming IP packet
and then forwards or discards the packet
– Filter packets going in both directions
– The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP header
– Two default policies (discard or forward)
Henric Johnson 70
Types of Firewalls
• Advantages:
– Simplicity
– Transparency to users
– High speed
• Disadvantages:
– Difficulty of setting up packet filter rules
– Lack of Authentication
Types of Firewalls
• Application-level Gateway
Henric Johnson 73
Types of Firewalls
• Application-level Gateway
– Also called proxy server
– Acts as a relay of application-level traffic
Types of Firewalls
• Advantages:
– Higher security than packet filters
– Only need to scrutinize a few allowable
applications
– Easy to log and audit all incoming traffic
• Disadvantages:
– Additional processing overhead on each
connection (gateway as splice point)
Types of Firewalls
• Circuit-level Gateway
Types of Firewalls
• Circuit-level Gateway
– Stand-alone system or
– Specialized function performed by an Application-
level Gateway
– Sets up two TCP connections
– The gateway typically relays TCP segments from
one connection to the other without examining
the contents
Types of Firewalls
• Circuit-level Gateway
– The security function consists of determining
which connections will be allowed
– Typically use is a situation in which the system
administrator trusts the internal users
– An example is the SOCKS package
Types of Firewalls
• Bastion Host
– A system identified by the firewall administrator as
a critical strong point in the network´s security
– The bastion host serves as a platform for an
application-level or circuit-level gateway
Firewall Configurations
Henric Johnson 81
Firewall Configurations
• Advantages:
– Three levels of defense to thwart intruders
– The outside router advertises only the existence of
the screened subnet to the Internet (internal
network is invisible to the Internet)
Firewall Configurations
• Advantages:
– The inside router advertises only the existence of
the screened subnet to the internal network (the
systems on the inside network cannot construct
direct routes to the Internet)
IDS, Log Files, HoneyPots
Overview
• Motivation
• What are Honeypots?
– Gen I and Gen II
• The GeorgiaTech Honeynet System
– Hardware/Software
– IDS
– Logging and review
• Some detected Exploitations
– Worm exploits
– Sage of the Warez Exploit
• Words of Wisdom
• Conclusions
Why Honeynets ?
Firewall IDS
Firewall IDS
HoneyNets
Gen I chosen
GATech Honeynet System
Huge network
4 TB data processing/day
Promiscuous mode
Forensic Analysis
Detected Exploitations
16 compromises detected
HONEY IDS
NET
IDS vs HoneyNet
• IDS – primary function is detection and
alerting
• Honeynets – use IDS to detect and alert
– but nothing is done to control the
threat
– Primary intent is to log and capture effects
and activities of the threat