SlideShare a Scribd company logo
CYBER SECURITY
Active learning assignment
On
FIRE WALL
Prepared by:-
1). Sonani Manav 140120119223
2). Suthar Chandresh 140120119229
3). Tade Govind 140120119230
Guided by :- Mukesh Khemani
 A choke point of control and monitoring
 Interconnects networks with differing trust
 Imposes restrictions on network services
◦ only authorized traffic is allowed
 Auditing and controlling access
◦ can implement alarms for abnormal behavior
 Itself immune to penetration
 Provides perimeter defence
Characterized by protocol level it
controls in
 Packet filtering
 Circuit gateways
 Application gateways
 Combination of above is dynamic
packet filter
 Simplest of components
 Uses transport-layer information only
◦ IP Source Address, Destination Address
◦ Protocol/Next Header (TCP, UDP, ICMP, etc)
◦ TCP or UDP source & destination ports
◦ TCP Flags (SYN, ACK, FIN, RST, PSH, etc)
◦ ICMP message type
 Examples
◦ DNS uses port 53
 No incoming port 53 packets except known trusted servers
 Filtering with incoming or outgoing
interfaces
◦ E.g., Ingress filtering of spoofed IP
addresses
◦ Egress filtering
 Permits or denies certain services
◦ Requires intimate knowledge of TCP and UDP port
utilization on a number of operating systems
 Start with a security policy
 Specify allowable packets in terms of logical
expressions on packet fields
 Rewrite expressions in syntax supported by
your vendor
 General rules - least privilege
◦ All that is not expressly permitted is prohibited
◦ If you do not need it, eliminate it
Every ruleset is followed by an implicit rule
reading like this.
Example 1:
Suppose we want to allow inbound mail
(SMTP, port 25) but only to our gateway
machine. Also suppose that mail from some
particular site SPIGOT is to be blocked.
Solution 1:
Example 2:
Now suppose that we want to implement the
policy “any inside host can send mail to the
outside”.
Solution 2:
This solution allows calls to come from any
port on an inside machine, and will direct them
to port 25 on the outside. Simple enough…
So why is it wrong?
 Our defined restriction is based solely on the
outside host’s port number, which we have
no way of controlling.
 Now an enemy can access any internal
machines and port by originating his call
from port 25 on the outside machine.
What can be a better solution ?
 The ACK signifies that the packet is part of an
ongoing conversation
 Packets without the ACK are connection
establishment messages, which we are only
permitting from internal hosts
 IP address spoofing
◦ Fake source address to be trusted
◦ Add filters on router to block
 Tiny fragment attacks
◦ Split TCP header info over several tiny packets
◦ Either discard or reassemble before check
 Degradation depends on number of rules applied
at any point
 Order rules so that most common traffic is dealt
with first
 Correctness is more important than speed
 TCP connection
◦ Server port is number less than 1024
◦ Client port is number between 1024 and 16383
 Permanent assignment
◦ Ports <1024 assigned permanently
 20,21 for FTP 23 for Telnet
 25 for server SMTP 80 for HTTP
 Variable use
◦ Ports >1024 must be available for client to make any
connection
◦ This presents a limitation for stateless packet filtering
 If client wants to use port 2048, firewall must allow incoming
traffic on this port
◦ Better: stateful filtering knows outgoing requests
 Traditional packet filters do not examine
higher layer context
◦ ie matching return packets with outgoing flow
 Stateful packet filters address this need
 They examine each IP packet in context
◦ Keep track of client-server sessions
◦ Check each packet validly belongs to one
 Hence are better able to detect bogus packets
out of context
 Packet filtering
 Application gateways
 Circuit gateways
 Combination of above is dynamic packet filter
 Firewall runs set of proxy programs
◦ Proxies filter incoming, outgoing packets
◦ All incoming traffic directed to firewall
◦ All outgoing traffic appears to come from firewall
 Policy embedded in proxy programs
 Two kinds of proxies
◦ Application-level gateways/proxies
 Tailored to http, ftp, smtp, etc.
◦ Circuit-level gateways/proxies
 Working on TCP level
 Has full access to protocol
◦ user requests service from proxy
◦ proxy validates request as legal
◦ then actions request and returns result to user
 Need separate proxies for each service
◦ E.g., SMTP (E-Mail)
◦ NNTP (Net news)
◦ DNS (Domain Name System)
◦ NTP (Network Time Protocol)
◦ custom services generally not supported
Daemon spawns proxy when communication detected …
Network Connection
Telnet
daemon
SMTP
daemon
FTP
daemon
Telnet
proxy
FTP
proxy SMTP
proxy
 E.g., Virus scanning for SMTP
◦ Need to understand MIME, encoding, Zip archives
 Packet filtering
 Application gateways
 Circuit gateways
 Combination of above is dynamic packet filter
Figure 9.7: A typical SOCKS connection through interface A,
and rogue connection through the external interface, B.
 Useless against attacks from the inside
◦ Evildoer exists on inside
◦ Malicious code is executed on an internal machine
 Organizations with greater insider threat
◦ Banks and Military
 Protection must exist at each layer
◦ Assess risks of threats at every layer
 Cannot protect against transfer of all virus
infected programs or files
◦ because of huge range of O/S & file types
Fire wall security

More Related Content

What's hot

Port Scanning Overview
Port Scanning  OverviewPort Scanning  Overview
Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
Mobile Security - Wireless hacking
Mobile Security - Wireless hackingMobile Security - Wireless hacking
Mobile Security - Wireless hacking
phanleson
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
Network scan
Network scanNetwork scan
Network scan
penetration Tester
 
Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddos
Oleh Stupak
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Eric Vanderburg
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
Sylvain Maret
 
Namp
Namp Namp
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
phanleson
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
SRIMCA
 
Dynamic Port Scanning
Dynamic Port ScanningDynamic Port Scanning
Dynamic Port Scanning
amiable_indian
 

What's hot (20)

Port Scanning Overview
Port Scanning  OverviewPort Scanning  Overview
Port Scanning Overview
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Mobile Security - Wireless hacking
Mobile Security - Wireless hackingMobile Security - Wireless hacking
Mobile Security - Wireless hacking
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Auto mac rateless wireless concurrent medium access
Auto mac rateless wireless concurrent medium accessAuto mac rateless wireless concurrent medium access
Auto mac rateless wireless concurrent medium access
 
Best!
Best!Best!
Best!
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Network scan
Network scanNetwork scan
Network scan
 
Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddos
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Namp
Namp Namp
Namp
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
I ptable
I ptableI ptable
I ptable
 
Dynamic Port Scanning
Dynamic Port ScanningDynamic Port Scanning
Dynamic Port Scanning
 

Viewers also liked

Gears
GearsGears
Boring machine
Boring machineBoring machine
Boring machine
Chandresh Suthar
 
Thermal stesses
Thermal stessesThermal stesses
Thermal stesses
Chandresh Suthar
 
Solidification
SolidificationSolidification
Solidification
Chandresh Suthar
 
protocolo pop y spam
protocolo pop y spamprotocolo pop y spam
protocolo pop y spam
Yaseli Rojas Gil
 
Https
HttpsHttps
Google y sus maravilosas aplicasiones
Google y sus maravilosas aplicasionesGoogle y sus maravilosas aplicasiones
Google y sus maravilosas aplicasionesChristian Manzano
 
W3 c tipos de dominio protocolos de
W3 c tipos de dominio protocolos deW3 c tipos de dominio protocolos de
W3 c tipos de dominio protocolos de
KnadeYuu
 
Presentación http https-dns
Presentación http https-dnsPresentación http https-dns
Presentación http https-dns
David Vargas
 
3. protocolos de red
3.  protocolos de red3.  protocolos de red
3. protocolos de red
Marlon Fabian Ñañez Meneses
 
protocolo pop
protocolo popprotocolo pop
protocolo pop
Yaseli Rojas Gil
 
Stess strain basic concept
Stess strain basic conceptStess strain basic concept
Stess strain basic concept
Chandresh Suthar
 
Free body diagram
Free body diagramFree body diagram
Free body diagram
Chandresh Suthar
 
Presentación POP3
Presentación POP3Presentación POP3
Presentación POP3Matías Leal
 
Heat conduction equation
Heat conduction equationHeat conduction equation
Heat conduction equation
Chandresh Suthar
 
Non destructive testing
Non destructive testingNon destructive testing
Non destructive testing
Chandresh Suthar
 
Protocolo HTTP
Protocolo HTTPProtocolo HTTP
Protocolo HTTP
Erick Dmgz
 
Presentacion http y https
Presentacion http y httpsPresentacion http y https
Presentacion http y https
Victor Sevillano
 
Frictional clutch
Frictional clutchFrictional clutch
Frictional clutch
Chandresh Suthar
 
Protocolo HTTP
Protocolo HTTPProtocolo HTTP
Protocolo HTTP
Jaime Vigueras
 

Viewers also liked (20)

Gears
GearsGears
Gears
 
Boring machine
Boring machineBoring machine
Boring machine
 
Thermal stesses
Thermal stessesThermal stesses
Thermal stesses
 
Solidification
SolidificationSolidification
Solidification
 
protocolo pop y spam
protocolo pop y spamprotocolo pop y spam
protocolo pop y spam
 
Https
HttpsHttps
Https
 
Google y sus maravilosas aplicasiones
Google y sus maravilosas aplicasionesGoogle y sus maravilosas aplicasiones
Google y sus maravilosas aplicasiones
 
W3 c tipos de dominio protocolos de
W3 c tipos de dominio protocolos deW3 c tipos de dominio protocolos de
W3 c tipos de dominio protocolos de
 
Presentación http https-dns
Presentación http https-dnsPresentación http https-dns
Presentación http https-dns
 
3. protocolos de red
3.  protocolos de red3.  protocolos de red
3. protocolos de red
 
protocolo pop
protocolo popprotocolo pop
protocolo pop
 
Stess strain basic concept
Stess strain basic conceptStess strain basic concept
Stess strain basic concept
 
Free body diagram
Free body diagramFree body diagram
Free body diagram
 
Presentación POP3
Presentación POP3Presentación POP3
Presentación POP3
 
Heat conduction equation
Heat conduction equationHeat conduction equation
Heat conduction equation
 
Non destructive testing
Non destructive testingNon destructive testing
Non destructive testing
 
Protocolo HTTP
Protocolo HTTPProtocolo HTTP
Protocolo HTTP
 
Presentacion http y https
Presentacion http y httpsPresentacion http y https
Presentacion http y https
 
Frictional clutch
Frictional clutchFrictional clutch
Frictional clutch
 
Protocolo HTTP
Protocolo HTTPProtocolo HTTP
Protocolo HTTP
 

Similar to Fire wall security

firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
MohanLal141254
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
Raj Kumar
 
Firewalls
FirewallsFirewalls
Firewalls
hemantag
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
gocokir267
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
Puneet Bawa
 
Firewalls
FirewallsFirewalls
Firewalls
FirewallsFirewalls
Firewalls
Akhil Sharma
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
Dr. Shivashankar
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
DAVID RAUDALES
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
inbroker
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
firewalls
firewallsfirewalls
firewalls
ahmedOday
 

Similar to Fire wall security (20)

firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Network security
 Network security Network security
Network security
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
firewalls
firewallsfirewalls
firewalls
 
Firewall
FirewallFirewall
Firewall
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 

More from Chandresh Suthar

Process of entrepreneureship
Process of entrepreneureshipProcess of entrepreneureship
Process of entrepreneureship
Chandresh Suthar
 
Solar energy
Solar energySolar energy
Solar energy
Chandresh Suthar
 
CELLULAR MANUFACTURING
CELLULAR MANUFACTURINGCELLULAR MANUFACTURING
CELLULAR MANUFACTURING
Chandresh Suthar
 
Recording techniques in method study
Recording techniques in method studyRecording techniques in method study
Recording techniques in method study
Chandresh Suthar
 
Multiport fuel injector system
Multiport fuel injector system Multiport fuel injector system
Multiport fuel injector system
Chandresh Suthar
 
Dynamics of reciprocating masses
Dynamics of reciprocating massesDynamics of reciprocating masses
Dynamics of reciprocating masses
Chandresh Suthar
 
Air conditioning system
Air conditioning system Air conditioning system
Air conditioning system
Chandresh Suthar
 
Homogeneous representation in geometric transformation
Homogeneous representation in geometric transformation Homogeneous representation in geometric transformation
Homogeneous representation in geometric transformation
Chandresh Suthar
 
Design of pressure vessel
Design of pressure vesselDesign of pressure vessel
Design of pressure vessel
Chandresh Suthar
 
Signal flow graph
Signal flow graphSignal flow graph
Signal flow graph
Chandresh Suthar
 
Lami's theorem
Lami's theoremLami's theorem
Lami's theorem
Chandresh Suthar
 

More from Chandresh Suthar (11)

Process of entrepreneureship
Process of entrepreneureshipProcess of entrepreneureship
Process of entrepreneureship
 
Solar energy
Solar energySolar energy
Solar energy
 
CELLULAR MANUFACTURING
CELLULAR MANUFACTURINGCELLULAR MANUFACTURING
CELLULAR MANUFACTURING
 
Recording techniques in method study
Recording techniques in method studyRecording techniques in method study
Recording techniques in method study
 
Multiport fuel injector system
Multiport fuel injector system Multiport fuel injector system
Multiport fuel injector system
 
Dynamics of reciprocating masses
Dynamics of reciprocating massesDynamics of reciprocating masses
Dynamics of reciprocating masses
 
Air conditioning system
Air conditioning system Air conditioning system
Air conditioning system
 
Homogeneous representation in geometric transformation
Homogeneous representation in geometric transformation Homogeneous representation in geometric transformation
Homogeneous representation in geometric transformation
 
Design of pressure vessel
Design of pressure vesselDesign of pressure vessel
Design of pressure vessel
 
Signal flow graph
Signal flow graphSignal flow graph
Signal flow graph
 
Lami's theorem
Lami's theoremLami's theorem
Lami's theorem
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 

Fire wall security

  • 1. CYBER SECURITY Active learning assignment On FIRE WALL Prepared by:- 1). Sonani Manav 140120119223 2). Suthar Chandresh 140120119229 3). Tade Govind 140120119230 Guided by :- Mukesh Khemani
  • 2.  A choke point of control and monitoring  Interconnects networks with differing trust  Imposes restrictions on network services ◦ only authorized traffic is allowed  Auditing and controlling access ◦ can implement alarms for abnormal behavior  Itself immune to penetration  Provides perimeter defence
  • 3. Characterized by protocol level it controls in  Packet filtering  Circuit gateways  Application gateways  Combination of above is dynamic packet filter
  • 4.
  • 5.  Simplest of components  Uses transport-layer information only ◦ IP Source Address, Destination Address ◦ Protocol/Next Header (TCP, UDP, ICMP, etc) ◦ TCP or UDP source & destination ports ◦ TCP Flags (SYN, ACK, FIN, RST, PSH, etc) ◦ ICMP message type  Examples ◦ DNS uses port 53  No incoming port 53 packets except known trusted servers
  • 6.  Filtering with incoming or outgoing interfaces ◦ E.g., Ingress filtering of spoofed IP addresses ◦ Egress filtering  Permits or denies certain services ◦ Requires intimate knowledge of TCP and UDP port utilization on a number of operating systems
  • 7.  Start with a security policy  Specify allowable packets in terms of logical expressions on packet fields  Rewrite expressions in syntax supported by your vendor  General rules - least privilege ◦ All that is not expressly permitted is prohibited ◦ If you do not need it, eliminate it
  • 8. Every ruleset is followed by an implicit rule reading like this. Example 1: Suppose we want to allow inbound mail (SMTP, port 25) but only to our gateway machine. Also suppose that mail from some particular site SPIGOT is to be blocked.
  • 9. Solution 1: Example 2: Now suppose that we want to implement the policy “any inside host can send mail to the outside”.
  • 10. Solution 2: This solution allows calls to come from any port on an inside machine, and will direct them to port 25 on the outside. Simple enough… So why is it wrong?
  • 11.  Our defined restriction is based solely on the outside host’s port number, which we have no way of controlling.  Now an enemy can access any internal machines and port by originating his call from port 25 on the outside machine. What can be a better solution ?
  • 12.  The ACK signifies that the packet is part of an ongoing conversation  Packets without the ACK are connection establishment messages, which we are only permitting from internal hosts
  • 13.  IP address spoofing ◦ Fake source address to be trusted ◦ Add filters on router to block  Tiny fragment attacks ◦ Split TCP header info over several tiny packets ◦ Either discard or reassemble before check  Degradation depends on number of rules applied at any point  Order rules so that most common traffic is dealt with first  Correctness is more important than speed
  • 14.  TCP connection ◦ Server port is number less than 1024 ◦ Client port is number between 1024 and 16383  Permanent assignment ◦ Ports <1024 assigned permanently  20,21 for FTP 23 for Telnet  25 for server SMTP 80 for HTTP  Variable use ◦ Ports >1024 must be available for client to make any connection ◦ This presents a limitation for stateless packet filtering  If client wants to use port 2048, firewall must allow incoming traffic on this port ◦ Better: stateful filtering knows outgoing requests
  • 15.  Traditional packet filters do not examine higher layer context ◦ ie matching return packets with outgoing flow  Stateful packet filters address this need  They examine each IP packet in context ◦ Keep track of client-server sessions ◦ Check each packet validly belongs to one  Hence are better able to detect bogus packets out of context
  • 16.
  • 17.  Packet filtering  Application gateways  Circuit gateways  Combination of above is dynamic packet filter
  • 18.  Firewall runs set of proxy programs ◦ Proxies filter incoming, outgoing packets ◦ All incoming traffic directed to firewall ◦ All outgoing traffic appears to come from firewall  Policy embedded in proxy programs  Two kinds of proxies ◦ Application-level gateways/proxies  Tailored to http, ftp, smtp, etc. ◦ Circuit-level gateways/proxies  Working on TCP level
  • 19.
  • 20.  Has full access to protocol ◦ user requests service from proxy ◦ proxy validates request as legal ◦ then actions request and returns result to user  Need separate proxies for each service ◦ E.g., SMTP (E-Mail) ◦ NNTP (Net news) ◦ DNS (Domain Name System) ◦ NTP (Network Time Protocol) ◦ custom services generally not supported
  • 21. Daemon spawns proxy when communication detected … Network Connection Telnet daemon SMTP daemon FTP daemon Telnet proxy FTP proxy SMTP proxy
  • 22.  E.g., Virus scanning for SMTP ◦ Need to understand MIME, encoding, Zip archives
  • 23.  Packet filtering  Application gateways  Circuit gateways  Combination of above is dynamic packet filter
  • 24.
  • 25. Figure 9.7: A typical SOCKS connection through interface A, and rogue connection through the external interface, B.
  • 26.  Useless against attacks from the inside ◦ Evildoer exists on inside ◦ Malicious code is executed on an internal machine  Organizations with greater insider threat ◦ Banks and Military  Protection must exist at each layer ◦ Assess risks of threats at every layer  Cannot protect against transfer of all virus infected programs or files ◦ because of huge range of O/S & file types