SlideShare a Scribd company logo
1 of 10
Cyber Security
Chapter 4: Cyber Security Technology and
Intrusion Detection
Topics
• Firewalls
• Virtual Private Network work, Kerberos
• Intrusion Detection
• IP security
Firewalls
• Firewall is a network security device , that monitors all inside and
outside traffic ,deny and accept traffic on the basis of predefined
policies and rules.
• With the grow of network and introduction of Internet companies
worried about two type of access
- How & What, employees are accessing outside resources
- How outsiders accessing its own private data resource.
• Characteristics of a firewall
1. All traffic must pass through the firewall.
2. Only traffic that follow local security policy rules should be allowed.
3. Firewall must be strong to protect it self from attacks on it.
• Limitations of Firewalls
1. Cannot protect against attacks that bypass the firewall.
2. Doesn't protect against internal threats.
• Types of Firewalls
1. Packet Filter
2. Application Level Gateway
• Packet filter firewall
Applies set of rules to each packet , and based on the
outcome decides to either forward or discard the packet.
Different policies are “default discard” or “default accept”
or apply number of rules.
Number of rules are based on headers of IP and TCP/UDP.
• Application Level Gateway
Such a firewall can filter packets at the application layer of
the OSI model.
Incoming or outgoing packets cannot access services for
which there is no proxy.
Virtual Private Network work, Kerberos
• VIRTUAL PRIVATE NETWORK (VPN)
A VPN is a mechanism of employing encryption, authentication,
and integrity protection so that we can use a public network as if
it is a private network.
Working:- Let us assume that host X on Network 1 wants to
send a data packet to host Y on Network 2.
1) Host X creates the packet, inserts its own IP address as the
source address and the IP address of host Y as the destination
address.
Source IPAddress Destination IP address
2) The packet reaches Firewall 1. Firewall 1 now adds new
headers to the packet. It changes the source IP address of the
packet from that of host X to its own address(i.e. IP address of
Firewall
IP of host X Actual Data IP of host Y
Source IPAddress Destination IP address
3) It also changes the destination IP address of the packet from
that of host Y to the IP address of Firewall 2.It also performs the
packet encryption and authentication, depending on the settings
and sends the modified packet over the Internet
4) The packet reaches to firewall 2 over the Internet, via routers.
Firewall 2 discards the outer header and performs the appropriate
decryption. It then takes a look at the plain text contents of the
packet and realizes that the packet is meant for host Y. It delivers
the packet to host Y.
KERBEROS
Kerberos is a mechanism through which we can authenticate a
user who want to access network resources. “Kerberos is a
authentication protocol who restrict unauthorized users to access
network resources”
IP of Firewall 2Step 1 Header + Actual DataIP of Firewall 1
Firewall 2 IPIP of YActual DataIP of XFirewall 1 IP
Intrusion Detection
• An intrusion detection system (IDS) monitors network traffic and
monitors for suspicious activity and alerts the system or network
administrator. In some cases the IDS may also respond to malicious
traffic by taking action such as blocking the user or source IP address
from accessing the network.
• IDS have following logical components
1) Traffic collection: collects activity as events from IDS to examine.
On Host-based IDS, this can be log files, Audit logs or traffic coming to
or leaving a system. On network based IDS, this is typically a
mechanism for copying traffic of network link.
2) Analysis Engine: examines collected network traffic & compares it to
known patterns of suspicious or malicious activity stored in digital
signature. The analysis engine act like a brain of IDS
3) Signature database: a collection of patterns & definitions‟ of known
suspicious or malicious activity.
4) User Interface & Reporting: interfaces with human element,
providing alerts when suitable & giving the user a means to interact
with & operate the IDS.
IP security
• IPSec Overview
IPSec is a capability that is added to IP protocol (IPv4 ,IPv6) by means
of some extra header to avoid following attacks at a network layer.
– Replay Attack
– Authentication attack
– Integrity Attack
– confidentiality attack
Authentication Header
Next Header is an 8-bit field that identifies the type of the next payload
after the Authentication Header.
Payload Length is length of AH in 32 bit word minus 2
Sequence Number is a number assigned to each incoming packet.
Authentication Data a variable length value used to check
authentication.
• IPsec ESP Format
• Security Parameters Index (32 bits): Identifies a security association.
• Sequence Number (32 bits): A monotonically increasing counter
value.
• Payload Data (variable): This is a transport-level segment (transport
mode) or IP packet(tunnel mode) that is protected by encryption.
• Padding (0–255 bytes): May be required if the encryption algorithm
requires the plaintext to be a multiple of some number of octets.
• Pad Length (8 bits): Indicates the number of pad bytes immediately
preceding this field.
• Next Header (8 bits): Identifies the type of data contained in the
Payload Data field by identifying the first header in that payload
(e.g., an extension header in IPv6, or an upper-layer protocol such as
TCP).
• ESP Authentication Data: A variable-length field (must be an integral
number of 32-bit words) that contains the integrity check value
computed over the ESP packet minus the Authentication Data field.

More Related Content

What's hot

IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6koolkampus
 
IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Networkshubham ghimire
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measureShivam Singh
 
Ip security
Ip securityIp security
Ip securityJithuK6
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6limsh
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
Wired equivalent privacy (wep)
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)akruthi k
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networksMaghan Das
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSystem ID Warehouse
 

What's hot (20)

WPA2
WPA2WPA2
WPA2
 
Ipsec
IpsecIpsec
Ipsec
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Network
 
IP Security
IP SecurityIP Security
IP Security
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Ip security
Ip securityIp security
Ip security
 
Ip security
Ip security Ip security
Ip security
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Wired equivalent privacy (wep)
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
 
IP security
IP securityIP security
IP security
 
IP Security
IP SecurityIP Security
IP Security
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
IP Security
IP SecurityIP Security
IP Security
 
WPA 3
WPA 3WPA 3
WPA 3
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 

Similar to Cyber security

Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptgocokir267
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfDr. Shivashankar
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet BawaPuneet Bawa
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfahmeddeath6
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarDr. Shivashankar
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityPriyadharshiniVS
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSvtunotesbysree
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 

Similar to Cyber security (20)

Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdf
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Ip Security.pptx
Ip Security.pptxIp Security.pptx
Ip Security.pptx
 
IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
 
Firewall
FirewallFirewall
Firewall
 
Ip security
Ip security Ip security
Ip security
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Cyber security

  • 1. Cyber Security Chapter 4: Cyber Security Technology and Intrusion Detection
  • 2. Topics • Firewalls • Virtual Private Network work, Kerberos • Intrusion Detection • IP security
  • 3. Firewalls • Firewall is a network security device , that monitors all inside and outside traffic ,deny and accept traffic on the basis of predefined policies and rules. • With the grow of network and introduction of Internet companies worried about two type of access - How & What, employees are accessing outside resources - How outsiders accessing its own private data resource. • Characteristics of a firewall 1. All traffic must pass through the firewall. 2. Only traffic that follow local security policy rules should be allowed. 3. Firewall must be strong to protect it self from attacks on it. • Limitations of Firewalls 1. Cannot protect against attacks that bypass the firewall. 2. Doesn't protect against internal threats.
  • 4. • Types of Firewalls 1. Packet Filter 2. Application Level Gateway • Packet filter firewall Applies set of rules to each packet , and based on the outcome decides to either forward or discard the packet. Different policies are “default discard” or “default accept” or apply number of rules. Number of rules are based on headers of IP and TCP/UDP. • Application Level Gateway Such a firewall can filter packets at the application layer of the OSI model. Incoming or outgoing packets cannot access services for which there is no proxy.
  • 5. Virtual Private Network work, Kerberos • VIRTUAL PRIVATE NETWORK (VPN) A VPN is a mechanism of employing encryption, authentication, and integrity protection so that we can use a public network as if it is a private network. Working:- Let us assume that host X on Network 1 wants to send a data packet to host Y on Network 2. 1) Host X creates the packet, inserts its own IP address as the source address and the IP address of host Y as the destination address. Source IPAddress Destination IP address 2) The packet reaches Firewall 1. Firewall 1 now adds new headers to the packet. It changes the source IP address of the packet from that of host X to its own address(i.e. IP address of Firewall IP of host X Actual Data IP of host Y
  • 6. Source IPAddress Destination IP address 3) It also changes the destination IP address of the packet from that of host Y to the IP address of Firewall 2.It also performs the packet encryption and authentication, depending on the settings and sends the modified packet over the Internet 4) The packet reaches to firewall 2 over the Internet, via routers. Firewall 2 discards the outer header and performs the appropriate decryption. It then takes a look at the plain text contents of the packet and realizes that the packet is meant for host Y. It delivers the packet to host Y. KERBEROS Kerberos is a mechanism through which we can authenticate a user who want to access network resources. “Kerberos is a authentication protocol who restrict unauthorized users to access network resources” IP of Firewall 2Step 1 Header + Actual DataIP of Firewall 1 Firewall 2 IPIP of YActual DataIP of XFirewall 1 IP
  • 7. Intrusion Detection • An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. In some cases the IDS may also respond to malicious traffic by taking action such as blocking the user or source IP address from accessing the network. • IDS have following logical components 1) Traffic collection: collects activity as events from IDS to examine. On Host-based IDS, this can be log files, Audit logs or traffic coming to or leaving a system. On network based IDS, this is typically a mechanism for copying traffic of network link. 2) Analysis Engine: examines collected network traffic & compares it to known patterns of suspicious or malicious activity stored in digital signature. The analysis engine act like a brain of IDS 3) Signature database: a collection of patterns & definitions‟ of known suspicious or malicious activity. 4) User Interface & Reporting: interfaces with human element, providing alerts when suitable & giving the user a means to interact with & operate the IDS.
  • 8. IP security • IPSec Overview IPSec is a capability that is added to IP protocol (IPv4 ,IPv6) by means of some extra header to avoid following attacks at a network layer. – Replay Attack – Authentication attack – Integrity Attack – confidentiality attack Authentication Header Next Header is an 8-bit field that identifies the type of the next payload after the Authentication Header. Payload Length is length of AH in 32 bit word minus 2 Sequence Number is a number assigned to each incoming packet. Authentication Data a variable length value used to check authentication.
  • 9. • IPsec ESP Format • Security Parameters Index (32 bits): Identifies a security association. • Sequence Number (32 bits): A monotonically increasing counter value. • Payload Data (variable): This is a transport-level segment (transport mode) or IP packet(tunnel mode) that is protected by encryption. • Padding (0–255 bytes): May be required if the encryption algorithm requires the plaintext to be a multiple of some number of octets.
  • 10. • Pad Length (8 bits): Indicates the number of pad bytes immediately preceding this field. • Next Header (8 bits): Identifies the type of data contained in the Payload Data field by identifying the first header in that payload (e.g., an extension header in IPv6, or an upper-layer protocol such as TCP). • ESP Authentication Data: A variable-length field (must be an integral number of 32-bit words) that contains the integrity check value computed over the ESP packet minus the Authentication Data field.