Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
College of Informatics
Department of Computer Science
Computer Security (CoSc4035)
Chapter Five: Security Mechanisms
University of Gondar
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Objectives
By the end of this lesson, you will be able to:
Define what firewall means and its application for computer
security
1
Identify intrusion detection system and intrusion prevention
system for security
2
Identify remote access and site-to –site VPN types
3
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Firewall
Proxy server
Virtual Private Network (VPN)
IDS/IPS
Security Mechanisms
Contents
1
2
3
4
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
What is firewall
1
 A firewall is hardware, software, or
a combination of both that is used
to prevent unauthorized programs
or Internet users from accessing a
private network and/or a single
computer
 A Firewall
 Acts as a security gateway between
two networks
 Tracks and controls network
communications
• Decides whether to pass, reject,
encrypt, or log communications
(Access Control)
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Hardware vs. Software firewalls
1
 Hardware Firewalls
• Protect an entire network
• Implemented on the router level
• Usually more expensive, harder
to configure
 Software Firewalls
• Protect a single
computer
• Usually less expensive,
easier to configure
How does firewall work
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
 Packet filtering router
 Circuit gateways
 Application gateways
 Combination of above is dynamic packet filter
Packet Filtering Router
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
 Applies a set of rules to each incoming IP packet to decide whether it
should be forwarded or discarded.
 Packet filters also called screening router or screening filter.
 Filter packets going in both directions
 Header information is used for filtering ( e.g, Protocol number,
source and destination IP, source and destination port numbers,
etc.)
 Stateless: each IP packet is examined isolated from what has
happened in the past
 The packet filter is typically set up as a list of rules based on
matches to fields in the IP or TCP header.
 Often implemented by a router (screening router)
Packet Filtering Router
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
Packet Filtering Router
Placing a simple router (or
similar hardware) between
internal network and
“outside”
Allow/prohibit packets from
certain services
Private Network
Packet
Filter
Outside
Packet-level
rules
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
 Advantages of Packet
Filtering
 Does not change the
traffic flow or
characteristics –passes
it through or doesn’t
 Simple
 Cheap
 Flexible: filtering is
based on current rules
 Disadvantages of Packet
Filtering
– Direct communication
between multiple hosts and
internal network
– Unsophisticated (protects
against simple attacks)
– Calibrating rule set may be
tricky
– Limited auditing
– Single point of failure
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
 STATEFUL PACKET FILTERS(DYNAMIC PACKET FILTER)
 Called Stateful Inspection or Dynamic Packet Filtering
 Traditional packet filters do not examine higher layer
context
 i.e matching return packets with outgoing flow
 Stateful packet filters address this need
 They examine each IP packet in context
 Keep track of client-server sessions
 Check each packet validly belongs to one
 Hence are better able to detect bogus packets out of
context
 Maintains a history of previously seen packets to make better
decisions about current and future packets
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
 STATEFUL PACKET FILTERS(DYNAMIC PACKET FILTER)
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
APPLICATION-LEVEL GATEWAY(OR PROXY SERVER)
• Also called proxy server
• Works at the application layer  must understand and implement
application protocol
• Acts as a transmitter of application-level traffic
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
APPLICATION-LEVEL GATEWAY(OR PROXY SERVER)
 Has full access to protocol
 user requests service from proxy
 proxy validates request as legal
 then actions request and returns result to user
 Simple flow:
• Client → ALG (proxy & inspection) → Server → ALG →
Client
 Need separate proxies for each service
 E.g., SMTP (E-Mail)
 NNTP (Net news)
 DNS (Domain Name System)
 NTP (Network Time Protocol)
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
APPLICATION-LEVEL GATEWAY(OR PROXY SERVER)
 Advantages: by permitting application traffic directly to internal
hosts
 Information hiding: names of internal systems are not known to outside
systems
 Can limit capabilities within an application
 Robust authentication and logging: application traffic can be pre-
authenticated before reaching host and can be logged
 Cost effective: third-party software and hardware for authentication and
logging only on gateway
 Less-complex filtering rules for packet filtering routers: need to check only
destination
 Most secure
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
APPLICATION-LEVEL GATEWAY(OR PROXY SERVER)
 Disadvantages:
 Keeping up with new applications
 Need to know all aspects of protocols
 May need to modify application
client/protocols
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
CIRCUIT-LEVEL GATEWAY
 Works at the transport layer
 Stand-alone system or Specialized function
performed by an Application-level Gateway.
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
CIRCUIT-LEVEL GATEWAY
 Is basically a generic proxy server for TCP
 Works like an application-level gateway, but at a lower level
 Helps in providing the security between UDP and TCP using
the connection
 It also acts as a handshaking device between trusted client or
servers to untrusted hosts and vise versa.
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types firewalls
1
CIRCUIT-LEVEL GATEWAY
 Advantages:
 Don’t need a separate
proxy server for each
application
 Provides an option for
applications for which
proxy servers don’t yet
exist
 Simpler to implement
than application specific
proxy servers
 Disadvantages:
 No knowledge of higher level
protocols – can’t scan for
active content or disallowed
commands
 Can only handle TCP
connections – new extensions
proposed for UDP
 Proprietary packages, TCP/IP
stacks must be modified by
vendor to use circuit-level
gateways
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
What is VPN
3
 A VPN is a private connection over an open
network
 VPNs extend corporate networks to remote
offices, mobile users, telecommuters and other
extranet partners.
 Basic functions include:
 Authentication – validates that the data was sent
from the sender.
 Access control – limiting unauthorized users from
accessing the network.
 Confidentiality – preventing the data to be read or
copied as the data is being transported.
 Data Integrity – ensuring that the data has not been
altered
Acme
Corp Site 2
Acme Corp
Site 1
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types of VPN
3
 Remote access VPNs
 Establish secure, encrypted connections
between mobile or remote users and their
corporate networks via a third-party
network, such as a Internet Service
Provider(ISP)
 VPN client – software, hardware as well as
router, or firewall based solutions
available.
 Reduced cost of long distance access calls
and internal equipment inventory
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types of VPN
3
 Site-to-Site VPNs
 are an alternative WAN
infrastructure that used to connect
branch offices, home offices, or
business partners' sites to all or
portions of a company's network.
 Intranet VPNs provide full access to
company’s network
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Types of VPN
3
Site-to-Site VPNs
 Extranet VPNS provide
business partners with
limited access to a
company’s network
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Overview of IDS/IPS
4
 Intrusion
• A set of actions aimed at compromising the security goals
(confidentiality, integrity, availability of a
computing/networking resource)
 Intrusion detection
• The process of identifying and responding to intrusion
activities
• Detects and alerts only
• Passive response (logs/alerts)
 Intrusion prevention
• The process of both detecting intrusion activities and
managing responsive actions throughout the network
• Detects and blocks traffic
• Active response (blocks/prevents)
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Components of Intrusion Detection System
4
Getnet T. Email: getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026
Security Mechanisms
Thank You

Chapter 5 Security Mechanisms iin computer security.pdf

  • 1.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 College of Informatics Department of Computer Science Computer Security (CoSc4035) Chapter Five: Security Mechanisms University of Gondar
  • 2.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Objectives By the end of this lesson, you will be able to: Define what firewall means and its application for computer security 1 Identify intrusion detection system and intrusion prevention system for security 2 Identify remote access and site-to –site VPN types 3
  • 3.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Firewall Proxy server Virtual Private Network (VPN) IDS/IPS Security Mechanisms Contents 1 2 3 4
  • 4.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms What is firewall 1  A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer  A Firewall  Acts as a security gateway between two networks  Tracks and controls network communications • Decides whether to pass, reject, encrypt, or log communications (Access Control)
  • 5.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Hardware vs. Software firewalls 1  Hardware Firewalls • Protect an entire network • Implemented on the router level • Usually more expensive, harder to configure  Software Firewalls • Protect a single computer • Usually less expensive, easier to configure How does firewall work
  • 6.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1  Packet filtering router  Circuit gateways  Application gateways  Combination of above is dynamic packet filter Packet Filtering Router
  • 7.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1  Applies a set of rules to each incoming IP packet to decide whether it should be forwarded or discarded.  Packet filters also called screening router or screening filter.  Filter packets going in both directions  Header information is used for filtering ( e.g, Protocol number, source and destination IP, source and destination port numbers, etc.)  Stateless: each IP packet is examined isolated from what has happened in the past  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header.  Often implemented by a router (screening router) Packet Filtering Router
  • 8.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1 Packet Filtering Router Placing a simple router (or similar hardware) between internal network and “outside” Allow/prohibit packets from certain services Private Network Packet Filter Outside Packet-level rules
  • 9.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1  Advantages of Packet Filtering  Does not change the traffic flow or characteristics –passes it through or doesn’t  Simple  Cheap  Flexible: filtering is based on current rules  Disadvantages of Packet Filtering – Direct communication between multiple hosts and internal network – Unsophisticated (protects against simple attacks) – Calibrating rule set may be tricky – Limited auditing – Single point of failure
  • 10.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1  STATEFUL PACKET FILTERS(DYNAMIC PACKET FILTER)  Called Stateful Inspection or Dynamic Packet Filtering  Traditional packet filters do not examine higher layer context  i.e matching return packets with outgoing flow  Stateful packet filters address this need  They examine each IP packet in context  Keep track of client-server sessions  Check each packet validly belongs to one  Hence are better able to detect bogus packets out of context  Maintains a history of previously seen packets to make better decisions about current and future packets
  • 11.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1  STATEFUL PACKET FILTERS(DYNAMIC PACKET FILTER)
  • 12.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1 APPLICATION-LEVEL GATEWAY(OR PROXY SERVER) • Also called proxy server • Works at the application layer  must understand and implement application protocol • Acts as a transmitter of application-level traffic
  • 13.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1 APPLICATION-LEVEL GATEWAY(OR PROXY SERVER)  Has full access to protocol  user requests service from proxy  proxy validates request as legal  then actions request and returns result to user  Simple flow: • Client → ALG (proxy & inspection) → Server → ALG → Client  Need separate proxies for each service  E.g., SMTP (E-Mail)  NNTP (Net news)  DNS (Domain Name System)  NTP (Network Time Protocol)
  • 14.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1 APPLICATION-LEVEL GATEWAY(OR PROXY SERVER)  Advantages: by permitting application traffic directly to internal hosts  Information hiding: names of internal systems are not known to outside systems  Can limit capabilities within an application  Robust authentication and logging: application traffic can be pre- authenticated before reaching host and can be logged  Cost effective: third-party software and hardware for authentication and logging only on gateway  Less-complex filtering rules for packet filtering routers: need to check only destination  Most secure
  • 15.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1 APPLICATION-LEVEL GATEWAY(OR PROXY SERVER)  Disadvantages:  Keeping up with new applications  Need to know all aspects of protocols  May need to modify application client/protocols
  • 16.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1 CIRCUIT-LEVEL GATEWAY  Works at the transport layer  Stand-alone system or Specialized function performed by an Application-level Gateway.
  • 17.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1 CIRCUIT-LEVEL GATEWAY  Is basically a generic proxy server for TCP  Works like an application-level gateway, but at a lower level  Helps in providing the security between UDP and TCP using the connection  It also acts as a handshaking device between trusted client or servers to untrusted hosts and vise versa.
  • 18.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types firewalls 1 CIRCUIT-LEVEL GATEWAY  Advantages:  Don’t need a separate proxy server for each application  Provides an option for applications for which proxy servers don’t yet exist  Simpler to implement than application specific proxy servers  Disadvantages:  No knowledge of higher level protocols – can’t scan for active content or disallowed commands  Can only handle TCP connections – new extensions proposed for UDP  Proprietary packages, TCP/IP stacks must be modified by vendor to use circuit-level gateways
  • 19.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms What is VPN 3  A VPN is a private connection over an open network  VPNs extend corporate networks to remote offices, mobile users, telecommuters and other extranet partners.  Basic functions include:  Authentication – validates that the data was sent from the sender.  Access control – limiting unauthorized users from accessing the network.  Confidentiality – preventing the data to be read or copied as the data is being transported.  Data Integrity – ensuring that the data has not been altered Acme Corp Site 2 Acme Corp Site 1
  • 20.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types of VPN 3  Remote access VPNs  Establish secure, encrypted connections between mobile or remote users and their corporate networks via a third-party network, such as a Internet Service Provider(ISP)  VPN client – software, hardware as well as router, or firewall based solutions available.  Reduced cost of long distance access calls and internal equipment inventory
  • 21.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types of VPN 3  Site-to-Site VPNs  are an alternative WAN infrastructure that used to connect branch offices, home offices, or business partners' sites to all or portions of a company's network.  Intranet VPNs provide full access to company’s network
  • 22.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Types of VPN 3 Site-to-Site VPNs  Extranet VPNS provide business partners with limited access to a company’s network
  • 23.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Overview of IDS/IPS 4  Intrusion • A set of actions aimed at compromising the security goals (confidentiality, integrity, availability of a computing/networking resource)  Intrusion detection • The process of identifying and responding to intrusion activities • Detects and alerts only • Passive response (logs/alerts)  Intrusion prevention • The process of both detecting intrusion activities and managing responsive actions throughout the network • Detects and blocks traffic • Active response (blocks/prevents)
  • 24.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Components of Intrusion Detection System 4
  • 25.
    Getnet T. Email:getnet6202@gmail.com , College of Informatics , University of Gondar, February 7, 2026 Security Mechanisms Thank You