Chapter 5
Chapter 5
1/29/2023 1
5.1 Access
Control
A protection system describes the conditions under which a system is secure
Access control is used to identify a user to a system
Associated with each user, there can be a profile that specifies permissible operations
and
accesses (authorization)
The operating system can enforce rules based on user profile
Access Control - Generalized View
o Access control: Verifying access rights to prevent misuse of resources
o Authorization: Granting access rights
1/29/2023 2
Access Control Matrix (ACM)
The access control matrix arose both in operating research and
systems database research in
It describes allowed accesses using a matrix
Basic elements of ACM
Subject: An entity capable of accessing objects, such as processes/software and
users; subjects are given security clearance
Object: Anything to which access is controlled programs, memory
(files, segments, …); objects have security classification
Access right: The way in which an object is accessed by a subject (read, write,
execute, …);
o The exact meaning of the operation depends on the nature of the
object;
“reading from” a file is obvious but what is “reading from” a process;
1/29/2023
o It could mean that the reader accepts messages from the process being read
3
Access Control Matrix
Object
Subject
An access control list of an object lists users and their permitted access
right
on the object
The list may contain a default or public entry
1/29/2023 6
Capability List
Decomposition of the ACM by rows (store each row with the
subject it represents)
Each subject has associated with it a set of pairs, with each pair
containing an object and a set of rights. The subject associated with
this list can access the named object in any of the ways indicated
by the named rights
1/29/2023 7
Access Control Policies and Models
Security policy governs a set of rules and objectives needed by an
organization
A security model can be used by an organization to help express the
policy or business rules to be used in a computer system
Access control policies are high-level requirements that specify how
access is managed and who may access information under
what circumstances
For instance, policies may pertain to resource usage within or across
organizational units or may be based on need-to-know, competence, authority,
or obligation
There are two types of access control models
Discretionary Access Control Model and
Non Discretionary Access Control Model
1/29/2023 8
Discretionary Access Controls (DACs) is an access policy determined by the
owner of an object. The owner decides who is allowed to access the
object and with what privileges
They are called discretionary as users can be given the ability of passing on
their privileges of any of the objects under them to other users, without the
intervention of the system administrator
Non Discretionary Access Controls (NDACs) are controls that cannot be
changed by users, but only through administrative action.
Users cannot pass access permissions on to other users at their
discretion.
NDAC has three popular forms of access control policies
1. Mandatory Access Control (MAC),
2. Role-Based Access Control (RBAC), and
3. Temporal Authorization (TA)
1/29/2023 9
1. Mandatory Access Control (MAC) is a means of restricting access to objects based on the
sensitivity of the information contained in the objects and the formal authorization of
subjects to access information of such sensitivity
In MAC, decisions are made by a central authority, not by the individual owner of an
object, and the owner cannot change access rights
An example of MAC occurs in military security, where an individual data owner does not
decide who has a Top Secret clearance, nor can the owner change the classification of an
object from Top Secret to Secret
2. Role-Based Access Control (RBAC) bases access control decisions on the
functions/roles
of a user that he/she is allowed to perform within an organization
This includes the specification of duties, responsibilities, and qualifications.
For example, the role “individual associated with a hospital” can include doctor, nurse
and
patient
3. Temporal Authorization (TA) are formal statements of access policies that
involve time-based access restrictions
1/29/2023 10
Trusted System: Reference Monitor (Implementing Policies)
Reference Monitor
A controlling element in the hardware and operating system that regulates the access
of subjects to objects on the basis of security parameters
It enforces the security policies
It has access to a security kernel database
1/29/2023 11
Multilevel Security Models
Multilevel Security
Military-style classifications
Subjects and objects are partitioned into different security
levels
1/29/2023
object 19
Biba Integrity Model – Policies
The Biba model is a family of different policies
The goal of the model is to prevent the contamination of “clean” high level
entities from “dirty” low level entities
1/29/2023 21
Note: circle = subject, square = object
1/29/2023 23
Basis for most type of access control and accountability
Two steps
o Identification
o Verification
Means of Authentication
Traditionally listed as three factors
o Something you know
Password, PIN
o Something you have
Card, RFID badge
o Something you are
Biometrics
1/29/2023 24
Kerberos provides a centralized authentication server whose function is to authenticate
users to servers and servers to users; it is a trusted system
from MIT
Relies on symmetric encryption, making no use of public-key encryption
Provides centralized symmetric third-party authentication in a distributed network
allows users to access services distributed through networks
without needing to trust all workstations
rather
Currently all are
there trusttwo
a central authentication
Kerberos versions server
V4: restricted to a single realm (a Kerberos realm is a set of managed nodes that share
the same Kerberos database)
V5: allows inter-realm authentication
V5 is an Internet standard: specified in RFC 1510, and used by many
utilities
To use Kerberos: You
need to have a KDC on your network
Major need to have- Kerberised
problem applications running on all
US export restrictions participating
Kerberos
systems cannot be directly distributed outside the source format
US in libraries must be re-implemented (crypto
1/29/2023 locally) 25
5.3
Firewall
The term firewall has been around for quite some time
and originally was used to define a barrier constructed
to prevent the spread of fire from one part of a
building or structure to another
1/29/2023 27
Firewall Overview
It is more feasible to secure a community of users by putting some control at the
entrance rather than trying to secure every host
This is done in the real world
o Countries protect themselves at their
borders
o Neighborhoods protect the whole neighbors
A firewall provides secured access between two networks
When information moves from the Internet to the internal network, confidentiality is not
an issue. However, integrity is.
The firewall must not accept messages that will cause servers to work incorrectly
or to crash
When information moves from the internal network to the Internet, confidentiality
and integrity are both concerns.
The firewall must ensure that no confidential information goes to the Internet and that
the information that reaches the Internet is correct
1/29/2023 28
Firewall – Design Goals
All traffic from outside to inside must pass through the firewall (physically
blocking
all access to the local network except via the firewall)
Only authorized traffic (defined by the local security policy) will be allowed to
pass
1/29/2023 29
Firewall - Features
Port Control: allow some (e.g., 80 for a Web server, 25 for a mail server, 21
and 20
for FTP server)
Network AddressandTranslation:
deny otherstranslates the IP addresses of internal hosts to hide
them from outside monitoring
Application Monitoring
Packet Filtering: rejects TCP/IP packets from hosts and rejects
unauthorized
connection attempts to unauthorized services
Data encryption: confidentiality of outgoing packets types of content by
Content Filtering: to block internal users from accessing
certain
category, such as hate group propaganda, pornography,
etc.
Virus Scanning
Popup advertisement blocking/Spam protection
Spyware protection
1/29/2023 30
Types of Firewalls
Firewall types can be categorized depending on
1. The firewall methodology
2. Whether the communication is being done between a single
node and the network, or between two or more networks
3. Whether the communication state is being tracked at the firewall or not
1. By the Firewall Methodology
Packet Filtering Firewall
Stateful Packet Inspection Firewall
Application Gateways/Proxies
Adaptive Proxies
Circuit Level Gateway
1/29/2023 31
i. Packet Filtering Firewall
A packet filtering firewall does exactly what its name implies - it filters packets.
As each packet passes through the firewall (in both directions), it is examined
and information contained in the header is compared to a pre-configured set of rules or
filter
An allow or deny decision is made based on the results of the comparison
A packet filtering firewall is often called a network layer firewall because the
filtering is primarily done at the network layer or transport layer of TCP/IP reference
layer
1/29/2023 32
ii. Stateful Packet Inspection Firewall :- Stateful packet inspection uses the same fundamental packet
screening technique that packet filtering does.
In addition, it examines the packet header information from the network layer to the application layer to verify
that the packet is part of a legitimate connection and the protocols are behaving as expected.
This method can make decisions based on one or
more of the following
Source IP address
Destination IP address
Protocol type (TCP/UDP)
Source port
Destination port
Connection state( it is derived from information gathered in previous
packet)
Stateful packet inspection compares the packets against the rules or filters and then
checks the dynamic state table to verify that the packets are part of a valid, established
connection
1/29/2023 33
iii. Application Gateways/Proxies :- Acts as a relay of application-level traffic. This type
of firewall operates at the application layer.
The user contacts the gateway using a TCP/IP application, such as Telnet or FTP, and
the gateway asks the user for the name of the remote host to be accessed. When the
user responds and provides a valid user ID and authentication information, the
gateway contacts the application on the remote host and relays TCP segments
containing the application data between the two endpoints
1/29/2023 34
iv. Adaptive Proxies :- Also known as dynamic proxies and developed as an enhanced form of
application gateways/proxies, combining the merits of both application gateways/proxies and
packet filtering.
v. Circuit Level Gateway :- It sets up two TCP connections; one between itself and a TCP
user on an inner host and one between itself and a TCP user on an outside host
The gateway typically relays TCP segments from one connection to the other
without examining the contents
The security function consists of determining which connections will be allowed
Unlike a packet filtering firewall, a circuit-level gateway does not examine individual packets.
Instead, circuit-level gateways monitor TCP or UDP sessions
Once a session has been established, it leaves the port open to allow all other
packets
belonging to that session to pass. The port is closed when the session is terminated.
It operate at transport layer
1/29/2023 35
2. With regard to the scope of filtered communications
Done between a single node and the network, or between two or more networks
3. Whether the firewalls keeps track of the state of network connections or treats each
packet in isolation
Stateful firewall
Stateless firewall
1/29/2023 36
a. Stateful firewall
Keeps track of the state of network connections (such as TCP streams)
travelling across it
A stateful firewall is able to hold in memory significant attributes
of each connection, from start to finish
These attributes, which are collectively known as the state of the connection,
may include such details as the IP addresses and ports involved in the connection
and the sequence numbers of the packets traversing the connection
b. Stateless firewall
Treats each network packet in isolation. Such a firewall has no way of knowing
if any given packet is part of an existing connection or is trying to establish a new
connection
1/29/2023 37
Firewall Location and Configuration
A firewall can be internal or external
An external firewall is placed at the edge of a local or enterprise
network, just inside the boundary router that connects to the Internet
One or more internal firewalls protect the bulk of the enterprise
network
Between these two types of firewalls are one or more networked
devices in a region referred to as a DMZ(demilitarized zone) network
Systems that are externally accessible but need some protections are
usually located on DMZ networks. Typically, the systems in the DMZ
require external connectivity, such as a corporate Web site, an e-mail
server, or a DNS (domain name system) server
1/29/2023 38
1/29/2023 39
The external firewall provides a measure of access control and protection for the
DMZ systems consistent with their need for external connectivity
The external firewall also provides a basic level of protection for the remainder of
the enterprise network
Internal firewalls serve three purposes
1. The internal firewall adds more stringent filtering capability, compared to the
external firewall, in order to protect enterprise servers and workstations
from external attack
2. The internal firewall provides two-way protection with respect to the DMZ.
First, the internal firewall protects the remainder of the network from attacks
launched from DMZ systems. Such attacks might originate from worms,
bots, or other malware lodged in a DMZ system. Second, an internal firewall
can protect the DMZ systems from attack from the internal protected
network
3. Multiple internal firewalls can be used to protect portions of the internal
network from each other. For example, firewalls can be configured so that
internal servers are protected from internal workstations and vice versa
1/29/2023 40
Distributed Firewalls
A distributed firewall configuration involves stand-alone
firewall devices plus host based firewalls working together
under a central administrative control
1/29/2023 41
5.4 Intrusion Detection/Prevention
Firewalls generally don’t detect internal attacks or attacks once the system is compromised
An Intrusion detection system gathers and analyzes information from various areas
within a
computer or a network to identify possible security breaches
An intrusion detection system, therefore, is a tool that monitors network traffic for potential
intrusions that may indicate malicious activity or a breach of policies.
It detects both intrusions and misuse
Intrusion detection functions include
Monitoring and analyzing both user and system activities
Analyzing system configurations and vulnerabilities
Assessing system and file integrity
Ability to recognize patterns typical of attacks
Analysis of abnormal activity patterns
Tracking user policy violations
1/29/2023 42
IDS Categorization
There are a number of ways in which Intrusion Detection Systems can be categorized
Misuse detection versus anomaly detection
Passive systems versus reactive systems
Network-based systems versus host-based systems
Misuse Detection vs. Anomaly Detection
An IDS that uses misuse detection analyzes the information it gathers and compares it to large
databases of attack signatures (IDS signatures); similar to a virus-detection system
Anomaly detection tries to detect intrusion attempts and notify the administrator
The system looks for any anomalous behavior; any activity that does not match the pattern of
normal user access is noted and logged
With anomaly-based IDS, it can take some time to create what is considered “normal” activity
patterns. While these activity patterns are being established, a high rate of false alarms may be
experienced.
Note also that, if the network already contains malicious code, then the activity of this code
would be considered normal
1/29/2023 43
Passive Systems Vs Reactive Systems
In a passive system, the IDS detects a potential security breach, logs the information,
and signals an alert.
In a reactive system, the IDS responds to the suspicious activity by logging off a user
or reprogramming the firewall to block network traffic from the suspected malicious
source