Unit IV Firewall
Unit IV Firewall
• Disadvantages :
• It is Expensive
• It is complicated
• Difficult to upgrade
• Tricky to configure
Software Firewall
• For individual home user , the most popular firewall is a software Firewall
• Software firewall can be installed on your computer and are easy to
customize. It allows to control over its functions and protection features
• Disadvantages :
• S/W firewalls only protects the computer on which they are installed , not
a N/W , so each computer will need to have a S/W firewall installed on it
Compare Hardware & Software Firewall
Sr. Hardware Firewall Software Firewall
No.
1 H/W firewall are specially built within S/W firewall are S/W program
H/W devices like routers installed on computer
• Disadvantages :
• The additional overhead for connection because there are two separate
connection:
• One between the end user & application gateway & another between the
application gateways & the remote host
• The application gateway has to manage these two sets of connections &
the traffic going between them
Circuit- Level Gateway
• The circuit level gateway can be a stand alone system or it can be a
specialized function performs by application level gateways for certain
application
• A circuit level gateway does not permit an end-to-end TCP connection
rather, the gateways sets up two TCP connections :
1. One between itself & a TCP user on an inner host
2. One between itself & a TCP user on an outside
Circuit- Level Gateway
• Once the two connections are established, the gateways typically relays
TCP segments from one connection to other without examining the
contents
• The security function consists of determining which connection will be
allowed
• A typical use of circuit level gateway is a situation in which the system
administrator trusts the internal users
• The gateway can be configured to support application level or proxy
service on inbound connections & circuit level functions for outbound
connection
• In this the gateway can acquire the processing overhead of examining
incoming application data for prohibited function but does not acquire
that overhead on outgoing data
Firewall Configuration
• A firewall is usually a combination of packet filter & application gateway.
Based on this there are three possible configurations of firewalls are as
follows :
1. Screened Host Firewall, Single –homed bastion
2. Screened Host Firewall, Dual-homed bastion
3. Screened Subnet Firewall
Screened Host Firewall, Single –homed
bastion
Screened Host Firewall, Single –homed bastion
• In this configuration , a firewall setup consist of two parts :
1. Packet Filtering router
2. An Application gateway
• A packet filter router ensures that the incoming traffic is allowed only if it
is destined for application gateway, by examining the destination address
field of each incoming IP packet
• Similarly, it also ensures that the outgoing traffic is allowed only if it is
originating from the application gateway by examining the source address
field of every outgoing IP packet
• The application gateway performs authentication & proxy function
Advantages & Disadvantages
• Advantages :
• This configuration increases the security of the N/W by performing checks
at both levels- packet & application level
• It provides more flexibility to N/W administrator to define more security
policies
• Disadvantages :
• The internal users are connected to the application gateway as well as to
the packet filter. Therefore the packet filter is somehow successfully
attacked & its security compromised then the whole internal N/W is
exposed to the attacker
Screened Host Firewall, Dual-homed bastion
Screened Host Firewall, Dual-homed bastion
• To overcome the drawbacks of a screened host firewall, single-Homed
bastion configuration, another type of configuration called as Screened
Host Firewall, Dual – Homed Bastion exists
• Here , direct connections between the internal host & the packet filter are
avoided.
• Instead , the packet filter connects only to the application gateway , which
in turn has a separate connection with the internal host. Therefore now
even if the packet filter is successfully attacked, only the application
gateway is visible to the attacker
• The internal host are protected. AS shown in above figure
Screened Subnet Firewall
Screened Subnet Firewall
• The Screened subnet firewall offers the highest security among the
possible firewall configurations
• Here Two packet filters are used , one between the Internet & the
application gateway as previously & another one between the application
gateway & the internal N/W.
Demilitarized Zone
DMZ
• A DMZ is a computer host or small N/W inserted as a neutral zone
between a company’s private N/W & the outside public network.
• It prevents outside users from getting direct access to a server that has
company data.
• DMZ is an optional & more secure approach to a firewall & effectively act
as a proxy server
• In a typical DMZ configuration for a small company, a separate computer
receives request from users within the private network for access to web
sites or other companies accessible on the public N/W
• The DMZ host then initiates sessions for these request on the public N/W
• However the DMZ host is not able to initiate a session back into the
private N/W
• It can only forward packets that have been requested by a host
• User of the public N/W outside the company can access only the DMZ
host
Limitations of Firewall
• The Firewall cannot protect against that bypass the firewall
• The Firewall does not protect internal treats
• A firewall cannot internal N/W from virus threats. This is because a
firewall cannot be expected to scan every incoming file or packet for
possible virus contents
• If a firewall is installed incorrectly it can prevent users accessing
information on the internet
Part - II
Intrusion Detection System
• Host based Intrusion Detection System
• Network based Intrusion Detection
System
Honeypots
Intrusion Detection System
• Intrusion Detection System is the process of monitoring the events
occurring in computer system or N/W & analyzing them for possible
incidents, which are threats of Computer Security.
• Intrusion Detection System(IDS) is a device or S/W application that
monitors N/W or system activities for malicious activities & produces
reports to a management station.
• Intrusion Detection System keeps watch on activities going on around it &
tries to identify unwanted activity .
Intrusion Detection system
• IDSs are typically divided into two main categories, depending on how
they monitor activity:
1 Host-based IDS:
• Examines activity on an individual system, such as a mail server, web
server, or individual PC. It is concerned only with an individual system and
usually has no visibility into the activity on the network or systems around
it.
2 Network-based IDS:
• Examines activity on the network itself. It has visibility only into the traffic
crossing the network link it is monitoring and typically has no idea of what
is happening on individual systems.
Intrusion Detection System (IDS)
Components of IDS
• An Intrusion detection system is having following logical components
1. Traffic Collector (or sensor):
• This component collects activity/events for the IDS to examine.
• On host-based IDS, this could be log files, audit logs, or traffic coming to
or leaving a specific system.
• On a network-based IDS, this is typically a mechanism for copying traffic
off the network link-basically functioning as a sniffer. This component is
often referred to as a sensor.
2. Analysis engine :
• This component examines the collected network traffic and compares it
to known patterns of suspicious or malicious activity stored in the
signature database. The analysis engine is the "brains" of the IDS.
Components of IDS
3. Signature database:
• The signature database is a collection of patterns and definitions of known
suspicious or malicious activity.
4. User Interface :
• The user interface is the visible component of the IDS-the part that
humans interact with.
• The user interface varies widely depending on the product and vendor and
could be anything from a detailed GUI to a simple command line.
• the interface is provided to allow the user to interact with the system:
changing parameters, receiving alarms, tuning signatures and response
patterns, and so on.
Advantages & Disadvantages
• Advantages :
• Operating system specific & have more detailed signatures
• Examine data after it has been decrypted
• Very application specific
• Determine whether or not an alarm may impact that specific
• Disadvantages :
• Should a process on every system to watch
• High cost of ownership and maintenance
• Uses local system resources
• Very focused view and cannot relate to activity around it
• If logged locally, could be compromised or disable
Network based Intrusion detection system
• A Network based Intrusion detection system focuses on N/W traffic the
bits & bytes traveling along the cables & wires that interconnect the
system
• Network based Intrusion detection system must examine the N/W traffic
as it is passes by & be able to analyze traffic according to protocol, type,
amount, source, destination, content, traffic etc.
• The Network based Intrusion detection system is looking for certain
activities are as follows :
• Denial of service attack
• Port scans or sweeps
• Malicious content in the data payload of a packet
• Vulnerability scanning
• Trojans, Viruses or worms
• Tunneling
• Brute force attack
Components of Network based Intrusion
detection system
Components of NIDS
1 Traffic Collector :
• Traffic collector reads every packet that passes through or within the N/W
to which it is connected to
• Traffic collector logically attaches itself to a network Interface card &
direct the NIC to receive every packet & forward them to Analysis engine
2. Analysis Engine :
• The N/W analysis engine is capable of collecting packets & examining
them individually & if essential, reassembling an entire traffic session
• Also N/W based analysis engine must be able to sustain with the flow of
traffic on the N/W , recreating N/W sessions & matching patterns in real
time
3. Signature Database :
• This component is a collection of patterns & definitions of known
suspicious or malicious activity
4. User Interface :
• This is visible component of IDS & it is interfaced with human elements
providing alerts whenever required & giving the user a means to interact
with & operate the IDS
Advantages & Disadvantages
• Advantages :
• Provide IDS coverage to fewer systems
• Lower cost for deployment, maintenance and upgrade
• Has visible into all network traffic and can correlate attacks among
multiple system
• Disadvantages :
• Ineffective when traffic is encrypted
• Cannot see traffic which does not pass it
• Should handle high volume of traffic
• Don’t know the activity on the host
Honeypots
• Honey Pots are the current innovation in Intrusion Detection technology
• Honey pots is a computer system on the Internet which is specifically set
up to attract & trap people who are attempting to penetrate other critical
system
• Honey pots are trap systems that are created to trap a possible attackers
away from critical systems
• Honey pots are designed to :
i) Distract an attacker from accessing critical system
ii) Gather information about the attackers activity
iii) Motivate an attacker to reside on the system for long time, so that
administrators get enough time to respond
• These system are loaded with fake information designed to look as if
valuable but not accessed by legitimate user
Honeypots
• The system is loaded with sensitive monitors & event loggers those spot
these accesses & gather information about the activities of attackers
• There are two different kinds of honeypots are as follows:
1. Production Honeypots :
Used by companies and corporations for the purpose of researching the
aims of hackers as well as diverting and mitigating the risk of attacks on
the overall network
2. Research Honeypots :
Used by non profit organizations and educational institutional for the
sole purpose of researching the motives and tactics of the hacker
community for targeting different networks
Honeypots
• Since any attack on honey pot seem to be successful, because
administrator have sufficient time to organize record & track the attackers
without ever showing the productive system
• Initial efforts involved in single honey pot compute with IP addresses
designed is to attract hackers
• Once hackers are inside the N/W, administrators can spot their behavior in
detail & figure out the defenses.
• Overall honeypots are considered as an effective method to track hackers
behavior & heighten the effectiveness of computer security tools
Advantages & Disadvantages
• Advantages :
• Attackers can be diverted to targets that they cannot damage
• Administrators have time to decide how to respond to an attacker
• Attackers actions can be easily & more extensively monitored & the
records can be used to refine threat models & improve system protections
• Honeypots may be effective at catching insiders who are snooping around
a N/W
• Disadvantages :
• Honeypots have not yet been shown to be generally useful security
technologies
• An expert attacker, once diverted into trap system, may become angry &
launch a more hostile attack against an organizations system