Chapter 5
Chapter 5
Chapter 5
• Security Mechanisms
05/22/2023 2
05/22/2023 3
firewall
are one of the most important security
devices for networks.
were officially invented in the early
1990s.
A firewall is a computer traffic cop that
permits or blocks data flow between two
parts of a network architecture.
It is the only link between parts.
05/22/2023 4
Firewalls
• A device that filters all traffic between a protected or “inside”
network and less trustworthy or “outside” network
• Most firewalls run as dedicated devices
• Easier to design correctly and inspect for bugs
• Easier to optimize for performance
• Firewalls implement security policies, or set of rules that
determine what traffic can or cannot pass through
• A firewall is an example of a reference monitor, which means it
should have three characteristics:
• Always invoked (cannot be circumvented)
• Tamperproof
• Small and simple enough for rigorous analysis
05/22/2023 5
Types of Firewalls
Packet filtering gateways or screening routers
Stateful inspection firewalls
Application-level gateways, also known as
proxies
Circuit-level gateways
Guards
Personal or host-based firewalls
05/22/2023 7
slide.
05/22/2023 8
Packet-Filtering Gateways
05/22/2023 9
application proxy
An application proxy simulates the behavior of an application
at OSI layer 7 so that the real application receives only requests
to act properly. Application proxies can serve a number of
purposes:
• Filtering potentially dangerous application-layer requests
• Log requests/accesses
• Cache results to save bandwidth
Perhaps the most common form of application proxies in the
real world is a web proxy, which companies often use to
monitor and filter employee Internet use.
05/22/2023 13
Application Proxy
05/22/2023 14
Circuit-Level Gateway
A circuit-level gateway is a firewall that
essentially allows one network to be an
extension of another.
It operates at OSI layer 5, the session layer,
and it functions as a virtual gateway between
two networks.
One use of a circuit-level gateway is to
implement a VPN.
05/22/2023 15
Circuit-Level Gateway
05/22/2023 16
Guard
• A sophisticated firewall that, like an application proxy, can
interpret data at the protocol level and respond
• The distinction between a guard and an application proxy
can be fuzzy; the more protection features an application
proxy implements, the more it becomes like a guard
• Guards may implement any programmable set of rules;
for example:
• Limit the number of email messages a user can receive
• Limit users’ web bandwidth
• Filter documents containing the word “Secret”
• Pass downloaded files through a virus scanner
05/22/2023 17
Personal Firewalls
05/22/2023 18
some intrusion detection systems are capable of taking actions when malicious
activity or anomalous traffic is detected, including blocking traffic sent from
suspicious Internet Protocol (IP) addresses.
An IDS can be contrasted with an intrusion prevention system (IPS), which
Types of IDS
• Detection method
• Signature-based
• Heuristic
• Location
• Front end
• Internal
• Scope
• Host-based IDS (HIDS)
• Network-based IDS (NIDS)
• Capability
• Passive
• Active, also known as intrusion prevention systems (IPS)
05/22/2023 23