Firewall Concept and Types, Tunneling VPN IDS.
Firewall Concept and Types, Tunneling VPN IDS.
1
Firewall
Firewalls
A firewall is an integrated collection of security measures designed to
prevent unauthorized electronic access to a networked computer system.
A network firewall is similar to firewalls in building construction, because
in both cases they are intended to isolate one "network" or "compartment"
from another.
3
Firewall Policies
To protect private networks and individual machines
from the dangers of the greater Internet, a firewall can
be employed to filter incoming or outgoing traffic
based on a predefined set of rules called firewall
policies.
Trusted internal network
Firewall policies
Untrusted
Internet
4
Policy Actions
Packets flowing through a firewall can have one of three
outcomes:
Accepted: permitted through the firewall
Dropped: not allowed through with no indication of failure
Rejected: not allowed through, accompanied by an attempt to inform the
source that the packet was rejected
5
Blacklists and White Lists
Two fundamental approaches to creating firewall policies (or
rulesets)
Blacklist approach (default-allow)
All packets are allowed through except those that fit the rules defined
specifically in a blacklist.
Pros: flexible in ensuring that service to the internal network is not disrupted
by the firewall
Cons: unexpected forms of malicious traffic could go through
6
Firewall Types
7
Stateless Firewalls
A stateless firewall doesn’t maintain any remembered context (or “state”)
with respect to the packets it is processing. Instead, it treats each packet
attempting to travel through it in isolation without considering packets that
it has processed previously.
SYN
Seq = x
Port=80
Client SYN-ACK
Seq = y
Ack = x + 1
ACK
Seq = x + 1
Ack = y + 1
Trusted internal Server
network
Firewall
Client (blocked)
SYN
Seq = y Attacker
Port=80
Stateful firewalls can tell when packets are part of legitimate sessions
originating within a trusted network.
Using these tables, stateful firewalls can allow only inbound TCP packets that
are in response to a connection initiated from within the internal network.
10
Statefull Firewall Example
Allow only requested TCP connections:
76.120.54.101
Server
SYN
Seq = x
128.34.78.55 Port=80
Client SYN-ACK
Seq = y
Ack = x + 1
ACK
Seq = x + 1
Ack = y + 1
Trusted internal SYN-ACK
network (blocked) Seq = y
Attacker
Port=80
12
Application-level Firewall gateway-to-remote
host session
host-to-gateway
Filters packets on application data as well as session
on IP/TCP/UDP fields.
application router and filter
Example: allow select internal users to gateway
telnet outside.
7-13
Firewall on Windows and Linux
On Linux, Iptables is used to On Windows, use “control
provide firewall function panel” “Windows Firewall”
http://en.wikipedia.org/wiki
/Iptables
14
Tunnels
The contents of TCP packets are not normally encrypted, so if someone is
eavesdropping on a TCP connection, he can often see the complete contents
of the payloads in this session.
One way to prevent such eavesdropping without changing the software
performing the communication is to use a tunneling protocol.
In such a protocol, the communication between a client and server is
automatically encrypted, so that useful eavesdropping is infeasible.
15
Tunneling Prevents Eavesdropping
Packets sent over the Internet are automatically encrypted.
Client Server
Tunneling protocol
(does end-to-end encryption and decryption)
Untrusted
TCP/IP Internet TCP/IP
17
Secure Shell (SSH)
The server sends the client a list of acceptable forms of authentication, which
the client will try in sequence.
Password based authentication
Public-key authentication method
Client sends the server its public key
The server then checks if this key is stored in its list of authorized keys. If so,
the server encrypts a challenge using the client’s public key and sends it to the
client
The client decrypts the challenge with its private key and responds to the
server, proving its identity
18
IPSec
IPSec defines a set of protocols to provide confidentiality and
authenticity for IP packets
19
Digital
signature
20
21
Virtual Private Networking (VPN)
There are two primary types of VPNs, remote access VPN and site-to-site
VPN.
22
Types of VPNs
Remote access VPNs allow authorized clients to access a private network
that is referred to as an intranet.
E.g., UCF VPN. Computer has internal IP when connected.
Set up a VPN endpoint, network access server (NAS)
Clients install VPN client software on their machines.
23
Intrusion Detection Systems
Intrusion
Actions aimed at compromising the security of the target (confidentiality,
integrity, availability of computing/networking resources)
Intrusion detection
The identification through intrusion signatures and report of intrusion
activities
Intrusion prevention
The process of both detecting intrusion activities and managing automatic
responsive actions throughout the network
24
IDS Components
IDS manager compiles data from the IDS sensors to determine if an
intrusion has occurred.
If an IDS manager detects an intrusion, then it sounds an alarm.
IDS Manager
Untrusted
Internet
router
router router
25
Possible Alarm Outcomes
Bad
(reject normal)
Alarm
Sounded
27
Base-Rate Fallacy Example
Suppose an IDS has 1% chance of false positives, and 1% of false negatives.
Suppose further…
An intrusion detection system generates 1,000,100 log entries.
Only 100 of the 1,000,100 entries correspond to actual malicious events.
Among the 100 malicious events, 99 will be detected as malicious, which
means we have 1 false negative.
Among the 1,000,000 benign events, 10,000 will be mistakenly identified
as malicious. That is, we have 10,000 false positives!
Thus, there will be 10,099 alarms sounded, 10,000 of which are false
alarms. That means false alarm rate is roughly 99%!
28
Types of Intrusion Detection Systems
29
Port Scanning
30
Port Scanning mode
Horizontal scan: target the same port on many target hosts, effectively
looking for a specific vulnerability
E.g., worm
E.g., attacker conduct reconnaissance before real attack
31
Reference
32