0% found this document useful (0 votes)
7 views

Network Security (2)

The document provides an overview of network security concepts, focusing on VPNs, firewalls, intrusion detection/prevention systems (IDS/IPS), and the role of proxies. It details various types of firewalls, their evolution, and the importance of security measures like IPSec for data integrity and confidentiality. Additionally, it outlines the architecture and functions of IPSec, including modes of operation and security associations.

Uploaded by

Solomon Asefa
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Network Security (2)

The document provides an overview of network security concepts, focusing on VPNs, firewalls, intrusion detection/prevention systems (IDS/IPS), and the role of proxies. It details various types of firewalls, their evolution, and the importance of security measures like IPSec for data integrity and confidentiality. Additionally, it outlines the architecture and functions of IPSec, including modes of operation and security associations.

Uploaded by

Solomon Asefa
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Network Security

VPNs (Virtual Private Networks) ❖ Context enrichment (e.g., geo-


Firewalls • Purpose: Establish private, secure location, user data).
• Definition: Security gateways between connections over public networks. ❖ Real-time alerting and dashboards.
networks that control traffic through • Features: Authentication and encryption Use Case
access control mechanisms (pass, to maintain data integrity and • Process Flow:
reject, encrypt, log communications). confidentiality. ❖ Collect data from diverse sources
• Types: Types of VPNs (e.g., network devices, identity
❖ Hardware Firewalls: Protect • Remote Access VPN: Connects remote systems).
entire networks at the router level. users to corporate networks. ❖ Extract meaningful insights through
❖ Software Firewalls: Protect • Site-to-Site VPN: Links multiple office correlation.
individual devices. locations. ❖ Present data via reports and
• Evolution of Firewalls: • Extranet VPN: Grants business partners- dashboards.
❖ Packet Filter controlled access to resources. Importance
❖ Stateful Inspection • Client/Server VPN: Protects internal • Proactive defense against sophisticated
❖ Application Proxy communications. attacks.
Packet Filters • Efficient log management and
• Operate at the network layer, making IDS/IPS compliance tracking.
decisions based on transport-layer data. Definitions • Enhanced threat detection and
• Key Features: • Intrusion: Actions threatening response.
❖ Examine packets for basic network/computing security.
accept/reject decisions. • IDS (Intrusion Detection System):
❖ Do not analyze higher protocol layers. Identifies intrusions. Firewall - Role
• Configuration Steps: • IPS (Intrusion Prevention System): • Data Inspection:
❖ Define a security policy to allow/deny Combines IDS with preventive ❖ Inspects inbound and outbound
traffic. measures (e.g., firewalls, antivirus). packets.
❖ Write rules using logical expressions IDS Components ❖ Decides whether packets should be
(e.g., IP, ports, protocols). 1. Audit Data: Raw system activity data. allowed or blocked.
❖ Translate rules into firewall-specific 2. Preprocessor: Formats audit data for • SNIFFING:
syntax. analysis. ❖ Attackers attempt to compromise
• Example Rules: 3. Detection Models: Patterns of services on the protected network.
❖ Default: Deny all traffic unless normal/intrusive activities. ❖ Firewall can:
explicitly allowed. 4. Detection Engine: Matches activity ▪ Alert the admin.
❖ Allow inbound SMTP (port 25) to a data with models. ▪ Strengthen its defense.
specific machine. 5. Alarms & Decision Engine: ▪ Reset TCP/IP connections.
❖ Block mail from untrusted sources. Determines and signals appropriate • Firewall Functions:
❖ Permit internal hosts to send/receive responses. ❖ Stops hackers from accessing your
mail on port 25. IDS Detection Approaches computer.
Application Gateways (Proxies) • Misuse Detection (Signature-Based): ❖ Protects personal information.
• Operate at the application layer to analyze Matches known intrusion patterns. ❖ Blocks pop-up ads and certain
content and commands. • Anomaly Detection: Flags deviations cookies.
• Advantages: from normal behavior. ❖ Controls which programs can access
❖ Block specific commands (e.g., FTP Deployment the internet.
"put"). • Network-Based IDS: Monitors traffic ❖ Blocks invalid packets.
❖ Enable detailed filtering. across a network.
• Disadvantages: • Host-Based IDS: Analyzes processes on Firewall Generations
❖ Moderate performance. individual devices. 1. First Generation - Packet Filtering
❖ Limited scalability. Firewall:
Stateful Inspection SIEM (Security Information and Event ❖ Monitors outgoing and incoming
• Operates between the data link and Management) packets.
network layers. Overview ❖ Allows or blocks traffic based on
• Tracks connection context using state source and destination IP addresses,
• Purpose: Combine log management
tables. protocols, and ports.
(LM) and security event analysis for
• Introduced by Check Point. ❖ Analyzes traffic at the transport
comprehensive threat detection.
protocol layer.
Network Address Translation (NAT) • Key Objectives:
❖ Treats each packet in isolation (no
• Converts private IPs into public IPs for o Identify threats.
connection tracking).
secure Internet communication. o Centralize security-relevant logs.
❖ Maintains a filtering table to decide
• Benefits: o Provide incident investigation
packet forwarding.
❖ Hides internal host addresses. support.
2. Second Generation - Stateful Inspection
❖ Enables more devices on the same Components and Features
Firewall:
network. • Core Components:
❖ Tracks the connection state of packets,
Firewall Deployment ❖ Log Collectors and Processors.
making it more efficient than packet
• Used at corporate gateways and internal ❖ Correlators and Databases.
filtering.
sensitive segments (e.g., Finance, HR). ❖ Reporting Engines.
❖ Makes filtering decisions based on the
• Prevents external attacks and internal • Capabilities: packet's history in the state table.
misuse. ❖ Log normalization and correlation.

1|Page
3. Third Generation - Application Layer ❖ Allows web browsing, FTP, email, ❖ Vulnerable to attacks like data
Firewall: and other services. tampering, identity spoofing, and
❖ Inspects and filters packets up to the ❖ Forwards client requests and retrieves privacy loss.
application layer. responses. • Solution: IPSec addresses these issues
❖ Recognizes and blocks misuse of with strong encryption, authentication,
specific applications and protocols Proxy Types and data integrity.
(e.g., HTTP, FTP). • Forward Proxy:
❖ Operates with proxy servers, ❖ Client requests the proxy to access 2. Security Issues in IP Networks
preventing direct connections between the internet. • Data Integrity Attack: Packets can be
internal and external networks. • Open Proxy: altered during transmission.
❖ Can also act as a Network Address ❖ Conceals a client's IP address while • Identity Spoofing: IP addresses can be
Translator (NAT). browsing. faked.
4. Next Generation Firewalls (NGFW): • Reverse Proxy: • Anti-Replay Attacks: Data can be
❖ Includes features like Deep Packet ❖ Forwards requests to proxy servers captured and resent without
Inspection, Application Inspection, and and presents the response as if it permission.
SSL/SSH inspection. came from the original server. • Loss of Privacy: Packet contents can be
❖ Provides advanced protection from read in transit.
modern threats. Proxy Server Architecture • How IPSec Helps:
• User Interface: ❖ Ensures encryption, integrity,
Firewall Types ❖ Provides easy management, including authentication, and replay protection
• Packet Filter: starting/stopping the proxy, blocking for data security.
❖ Looks at packets entering or leaving URLs/clients, and managing
the network. logs/cache. 3. What is IPSec?
❖ Accepts or rejects based on rules. • Proxy Server Listener: • Definition: A set of protocols and
❖ Transparent to users but hard to ❖ Listens for client requests and algorithms that secure IP traffic at the
configure. handles client blocking. network layer.
❖ Vulnerable to IP spoofing. • Connection Manager: • Compatibility:
• Application Gateway/Proxy: ❖ Manages proxy connections. ❖ Built into IPv6 and supports IPv4.
❖ Handles TCP/IP application requests • Cache Manager: • Functions:
(e.g., FTP, TELNET). ❖ Manages web page storage, deletion, ❖ Works across different security layers
❖ Highly effective but can cause and retrieval from the cache. (e.g., TLS, HTTPS).
performance degradation. • Log Manager: ❖ Hardware encryption adds an extra
• Circuit Level Gateway: ❖ Manages logs, including viewing, layer of security for all applications.
❖ Standalone application that doesn’t clearing, and updating logs.
permit end-to-end TCP connections. • Configuration Module: 4. Core Functions of IPSec
❖ Sets up two TCP connections ❖ Configures proxy settings like 1. Authentication:
(internal and external hosts). caching. ❖ Ensures packets are from the
• Bastion Host: intended sender.
❖ A dedicated machine designed to Tunneling - Proxy ❖ Verifies packets haven’t been altered
withstand attacks. • Purpose: in transit.
❖ Hosts specific applications (e.g., ❖ Allows users to bypass firewall 2. Confidentiality:
Telnet, SMTP, FTP). restrictions by sending data through ❖ Encrypts messages to prevent
❖ Limits application support to reduce HTTP (port 80). eavesdropping.
security threats.
• SSL Tunneling: 3. Key Management:
❖ Web proxy servers use SSL tunneling ❖ Safely exchanges and manages
Port Forwarding protocols to securely transmit data encryption keys.
• Usage: through port 443. Applications:
❖ Allows internal devices to • Used in secure e-commerce, remote
communicate with the external Proxy Connection Settings access, LANs, WANs, and the Internet.
network via a single public IP
• Configuration Options:
address.
❖ Manual or automatic proxy 5. Benefits of IPSec
❖ Router/firewall must forward • Provides strong security for all traffic
configuration.
incoming connections to specific
❖ Specific ports for HTTP, SSL, FTP, crossing firewalls/routers.
private IP addresses and ports.
SOCKS. • Transparent to applications and end-users.
• Process: ❖ Options for exceptions (e.g., • Secures routing architecture and
❖ Network administrators configure localhost). individual users.
routers to accept and forward
connections.
6. IPSec Documents
Simplified Document: IP Security (IPSec) 1. Architecture:
Proxy Overview
❖ Describes security concepts and
• Definition: 1. Introduction to IPSec mechanisms (RFC 4301).
❖ A proxy acts as an intermediary for • IP Protocol Issue: Original IP design 2. Authentication Header (AH):
machines on the network to access (from the 1970s–80s) lacked security ❖ Ensures message authentication and
the internet. since all hosts and users were known integrity (RFC 4302).
❖ It forwards requests from clients to and trusted. 3. Encapsulating Security Payload
other servers or services.
• Modern Internet Challenges: (ESP):
• Proxy Functions: ❖ Untrusted public networks.
2|Page
❖ Provides encryption and ❖ Sequence Number Counter:
authentication (RFC 4303). Prevents duplicate packets.
4. Internet Key Exchange (IKE): ❖ Anti-Replay Window: Detects and
❖ Manages secure key exchanges. prevents replay attacks.
5. Cryptographic Algorithms: ❖ AH/ESP Information: Stores
❖ Defines encryption, authentication, algorithms, keys, and lifetimes.
and key exchange methods. ❖ Lifetime: Defines when an SA
6. Domain of Interpretation (DOI): expires.
❖ Specifies encryption/authentication ❖ IPSec Protocol Mode: Specifies
identifiers and operational transport or tunnel mode.
parameters. ❖ Path MTU: Tracks the maximum
packet size for transmission.
7. IPSec Architecture
• Modes of Operation: 11. Security Policy Database (SPD)
1. Transport Mode: • Purpose: Determines how IP traffic
 End-to-end security between relates to specific SAs.
two hosts. • SA Selectors:
2. Tunnel Mode: ❖ Destination IP Address: Can specify
 Security between gateways or a single address, a range, or a
between a host and a gateway wildcard.
(used in VPNs). ❖ Source IP Address: Same options as
• Key Components: destination.
 Security Association (SA): One- ❖ User ID: Links traffic to a specific
way relationship providing security user (if supported).
for traffic. ❖ Data Sensitivity Level: Defines the
 Security Parameter Index (SPI): security level (e.g., secret or public).
A unique identifier for each SA. ❖ Transport Protocol: Identifies the
 Security Association Database protocol (e.g., TCP, UDP).
(SAD): Stores all parameters for ❖ Source/Destination Ports: Specifies
each SA. the application or service (e.g., port
 Security Policy Database (SPD): 80 for HTTP).
Links IP traffic to specific SAs Actions:
based on rules. 1. Discard: Blocks traffic.
2. Bypass: Allows traffic without IPSec.
8. Transport Mode vs. Tunnel Mode 3. Protect: Applies IPSec security.
• Transport Mode:
 Encrypts only the packet’s payload 12. Actions When SA is Missing
(inner data). • Outbound Traffic:
 AH can protect headers and payloads. ❖ Use IKE to dynamically generate an
• Tunnel Mode: SA.
 Encrypts the entire packet, including • Inbound Traffic:
headers. ❖ Drop the packet if no SA is available.
 AH applies to parts of the outer
header.

9. Security Association (SA)


• Definition:
Step in encryption in DES
❖ A one-way relationship providing
security for traffic between sender i. Initial Permutation
and receiver.
ii. Compute Round Key
• Key Features:
❖ SA specifies encryption keys, iii. Divide the message in to right
algorithms, and policies for securing and left half
traffic. iv. Expand the right hand to 48-bit
❖ Identified by three parameters:
1. SPI: A 32-bit identifier in v. XOR with the round key
AH/ESP headers. vi. Pass through S-Box
2. IP Destination Address: End vii. Apply P-Box
address for the SA.
3. Security Protocol Identifier:
viii. XOR with previous left that will
Indicates if it’s an AH or ESP be next right
association. ix. Previous right will be next left
10. Security Association Database (SAD)
• Definition: Stores the parameters for each
SA.
• Key Parameters:

3|Page

You might also like