SlideShare a Scribd company logo
1 of 28
Download to read offline
FIREWALLS AND INTRUSION
PREVENTION SYSTEMS
CS432: Network Security
The Need For Firewalls




Internet connectivity is essential
However it creates a threat
Effective means of protecting LANs
Inserted between the premises network and the
Internet to establish a controlled link
Can be a single computer system or a set of two or
more systems working together
Used as a perimeter defence
Single choke point to impose security and auditing
Insulates the internal systems from external
networks
2
Firewall Characteristics


Design goals:
All traffic from inside to outside must pass
through the firewall
Only authorized traffic as defined by the local
security policy will be allowed to pass
The firewall itself is immune to penetration
Techniques used by firewalls to control access
and enforce the site’s security policy are:
Service control
Direction control
User control
Behavior control
3
Firewall Capabilities and Limits


Capabilities:
Defines a single choke point
Provides a location for monitoring security events
Convenient platform for several Internet
functions that are not security related
Can serve as the platform for IPSec
Limitations:
Cannot protect against attacks bypassing firewall
May not protect fully against internal threats
Improperly secured wireless LAN can be accessed
from outside the organization
Laptop, PDA, or portable storage device may be
infected outside the corporate network then used
internally
4
Types of Firewalls
5
Types of Firewalls
6
Packet Filtering Firewall





Applies rules to each incoming and outgoing IP packet
Typically a list of rules based on matches in the IP or TCP
header
Forwards or discards the packet based on rules match
Filtering rules are based on information contained in a
network packet
Source IP address
Destination IP address
Source and destination transport-level address
IP protocol field
Interface
Two default policies:
Discard - prohibit unless expressly permitted
More conservative, controlled, visible to users
Forward - permit unless expressly prohibited
Easier to manage and use but less secure
7
Rule Set Examples
8
Rule Set Examples
9
Advantages and Weaknesses





Advantages
Simplicity
Typically transparent to users and are very fast
Weaknesses
Cannot prevent attacks that employ application
specific vulnerabilities or functions
Limited logging functionality
Do not support advanced user authentication
Vulnerable to attacks on TCP/IP protocol bugs
IP spoofing attacks
Source routing attacks
Tiny fragment attacks
Improper configuration can lead to breaches
10
Stateful Inspection Firewall


Tightens rules for TCP traffic by creating a
directory of outbound TCP connections
There is an entry for each currently established
connection
Packet filter allows incoming traffic to high
numbered ports only for those packets that fit
the profile of one of the entries in this directory
Reviews packet information but also records
information about TCP connections
Keeps track of TCP sequence numbers to prevent
attacks that depend on the sequence number
Inspects data for protocols like FTP, IM and SIPS
commands
11
Stateful Firewall Connection State Example
12
Application-Level Gateway





Also called an application proxy
Acts as a relay of application-level traffic
User contacts gateway using a TCP/IP application
User is authenticated
Gateway contacts application on remote host and
relays TCP segments between server and user
Must have proxy code for each application
May restrict application features supported
Tend to be more secure than packet filters
Disadvantage:
Additional processing overhead on each connection
13
Circuit-Level Gateway
Circuit level proxy
•
•
•
Sets up two TCP connections, one between itself and a TCP user
on an inner host and one on an outside host
Relays TCP segments from one connection to the other without
examining contents
Security function consists of determining which connections will
be allowed
Typically used when inside users are trusted
•
•
May use application-level gateway inbound and circuit-level
gateway outbound
Lower overheads
14
SOCKS Circuit-Level Gateway




SOCKS v5 defined in RFC1928
Designed to provide a framework for client-
server applications in TCP/UDP domains to
conveniently and securely use the services of
a network firewall
Client application contacts SOCKS server,
authenticates, sends relay request
Server evaluates and either establishes or denies
the connection
Components:
SOCKS server
SOCKS client library
SOCKS-ified client applications
15
Bastion Hosts



System identified as a critical strong point in
the network’s security
Serves as a platform for an application-level
or circuit-level gateway
Common characteristics:
Runs secure O/S, only essential services
May require user authentication to access proxy
or host
Each proxy can restrict features, hosts accessed
Each proxy is small, simple, checked for security
Each proxy is independent, non-privileged
Limited disk use, hence read-only code
16
Host-Based Firewalls





Used to secure an individual host
Available in operating systems or can be
provided as an add-on package
Filter and restrict packet flows
Common location is a server
Advantages:
Filtering rules can be tailored to the host
environment
Protection is provided independent of
topology
Provides an additional layer of protection
17
Personal Firewall







Controls traffic between a personal computer or
workstation and the Internet or enterprise network
For both home or corporate use
Typically is a software module on a personal computer
Can be housed in a router that connects all of the home
computers to a DSL, cable modem, or other Internet
interface
Typically much less complex than server-based or stand-
alone firewalls
Primary role is to deny unauthorized remote access
May also monitor outgoing traffic to detect and block
worms and malware activity
18
Example Firewall Configuration - DMZ Networks
19
DMZ Networks
20






DMZ (demilitarized zone)
A region between internal and external firewalls
External firewall
Placed at the edge of a local or enterprise network
Measure of access control and protection for the DMZ systems
Internal firewall
Protect the bulk of the enterprise network
Provides a basic level of protection for the remainder of the
network
Purposes:
Adds more stringent filtering capability
Provides two-way protection with respect to the DMZ
Used to protect portions of the internal network from each other
Virtual Private Networks (VPNs)
21


VPN consists of a set of computers that
interconnect by means of a relatively
unsecure network and that make use of
encryption and special protocols to provide
security
Example
IPSec
Virtual Private Networks (VPNs)
22
Example Distributed Firewall Configuration
23
Firewall Topologies
• Includes personal firewall software and firewall
software on servers
Host-resident firewall
• Single router between internal and external
networks with stateless or full packet filtering
Screening router
• Single firewall device between an internal and
external router
Single bastion inline
• has a third network interface on bastion to a DMZ
where externally visible servers are placed
Single bastion T
• DMZ is sandwiched between bastion firewalls
Double bastion inline
• DMZ is on a separate network interface on the
bastion firewall
Double bastion T
• Used by large businesses and government
organizations
Distributed firewall
configuration
24
Intrusion Prevention Systems (IPS)




Recent addition to security products
Inline network-based IDS that can block traffic
Functional addition to firewall that adds IDS
capabilities
Can block traffic like a firewall
Makes use of algorithms developed for IDSs
May be network or host based
25
Host-Based IPS (HIPS)




Identifies attacks using both signature and anomaly
detection techniques
Signature: focus is on the specific content of
application payloads in packets, looking for
patterns that have been identified as malicious
Anomaly: IPS is looking for behavior patterns
that indicate malware
Can be tailored to the specific platform
Can also use a sandbox approach to monitor
behavior
Advantages:
The various tools work closely together
Threat prevention is more comprehensive
Management is easier
26
Network-Based IPS (NIPS)




Inline NIDS with the authority to discard
packets and tear down TCP connections
Uses signature and anomaly detection
May provide flow data protection
Monitoring full application flow content
Can identify malicious packets using:
Pattern matching
Stateful matching
Protocol anomaly
Traffic anomaly
Statistical anomaly
27
Snort Inline





Enables Snort to function as an intrusion prevention
capability
Includes a replace option which allows the Snort user
to modify packets rather than drop them
Useful for a honeypot implementation
Attackers see the failure but can’t figure out why it
occurred
Operations:
drop
Snort rejects a packet based on the options defined in the rule
and logs the result
reject
packet is rejected and result is logged and an error message is
returned
Sdrop
packet is rejected but not logged
28

More Related Content

Similar to Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g of this compound

Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfDr. Shivashankar
 
Firewall (Network Firewall used by Network)
Firewall (Network Firewall used by Network)Firewall (Network Firewall used by Network)
Firewall (Network Firewall used by Network)BilalMehmood44
 
Firewall By Saood N Mubeen for network security.pptx
Firewall By Saood N Mubeen for network security.pptxFirewall By Saood N Mubeen for network security.pptx
Firewall By Saood N Mubeen for network security.pptxMuhammadSaoodChoudha
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 

Similar to Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g of this compound (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 
Firewall
FirewallFirewall
Firewall
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall (Network Firewall used by Network)
Firewall (Network Firewall used by Network)Firewall (Network Firewall used by Network)
Firewall (Network Firewall used by Network)
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall By Saood N Mubeen for network security.pptx
Firewall By Saood N Mubeen for network security.pptxFirewall By Saood N Mubeen for network security.pptx
Firewall By Saood N Mubeen for network security.pptx
 
Network security
Network securityNetwork security
Network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Firewall
FirewallFirewall
Firewall
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 

More from FahmiOlayah

Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...FahmiOlayah
 
endoscope.Motion Sensor Interfacing with Microcontrollerppt
endoscope.Motion Sensor Interfacing with Microcontrollerpptendoscope.Motion Sensor Interfacing with Microcontrollerppt
endoscope.Motion Sensor Interfacing with MicrocontrollerpptFahmiOlayah
 
Computer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdf
Computer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdfComputer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdf
Computer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdfFahmiOlayah
 
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptxfffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptxFahmiOlayah
 
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...FahmiOlayah
 
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdfTRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdfFahmiOlayah
 
10447Safety and security and ways to use them558.ppt
10447Safety and security and ways to use them558.ppt10447Safety and security and ways to use them558.ppt
10447Safety and security and ways to use them558.pptFahmiOlayah
 
SAFETY CONCERNlllSafety and security and ways to use them
SAFETY CONCERNlllSafety and security and ways to use themSAFETY CONCERNlllSafety and security and ways to use them
SAFETY CONCERNlllSafety and security and ways to use themFahmiOlayah
 
11Jaundice is one of the most common conditions requiring medical attention...
11Jaundice is one of the most  common conditions requiring medical  attention...11Jaundice is one of the most  common conditions requiring medical  attention...
11Jaundice is one of the most common conditions requiring medical attention...FahmiOlayah
 
Phototherapyhospital-website-project-proposal.pptx
Phototherapyhospital-website-project-proposal.pptxPhototherapyhospital-website-project-proposal.pptx
Phototherapyhospital-website-project-proposal.pptxFahmiOlayah
 
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptxFahmiOlayah
 
L4-IntroducClick to edit Master title styletion to logic.pptx
L4-IntroducClick to edit Master title styletion to logic.pptxL4-IntroducClick to edit Master title styletion to logic.pptx
L4-IntroducClick to edit Master title styletion to logic.pptxFahmiOlayah
 
L9-files fClick to edit Master title styleormat.pptx
L9-files fClick to edit Master title styleormat.pptxL9-files fClick to edit Master title styleormat.pptx
L9-files fClick to edit Master title styleormat.pptxFahmiOlayah
 
60Click to edit Master title style467.ppt
60Click to edit Master title style467.ppt60Click to edit Master title style467.ppt
60Click to edit Master title style467.pptFahmiOlayah
 
Click to edit Master title styleClick to edit Master title style
Click to edit Master title styleClick to edit Master title styleClick to edit Master title styleClick to edit Master title style
Click to edit Master title styleClick to edit Master title styleFahmiOlayah
 

More from FahmiOlayah (15)

Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
endoscope.Motion Sensor Interfacing with Microcontrollerppt
endoscope.Motion Sensor Interfacing with Microcontrollerpptendoscope.Motion Sensor Interfacing with Microcontrollerppt
endoscope.Motion Sensor Interfacing with Microcontrollerppt
 
Computer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdf
Computer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdfComputer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdf
Computer Ethics _PENTAX VIDEODiagnostic endoscopy PROCESSOR EPK-1000 Chp 1.pdf
 
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptxfffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
fffffDiagnostic endoscopyPENTAX VIDEO PROCESSOR EPK-1000f.pptx
 
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
MedicalDevicesType K tube has thicker walls than Type L tube, and Type L wall...
 
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdfTRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
TRL102610-What is IT Governancedigital Transformation Plan Company ppt.pdf
 
10447Safety and security and ways to use them558.ppt
10447Safety and security and ways to use them558.ppt10447Safety and security and ways to use them558.ppt
10447Safety and security and ways to use them558.ppt
 
SAFETY CONCERNlllSafety and security and ways to use them
SAFETY CONCERNlllSafety and security and ways to use themSAFETY CONCERNlllSafety and security and ways to use them
SAFETY CONCERNlllSafety and security and ways to use them
 
11Jaundice is one of the most common conditions requiring medical attention...
11Jaundice is one of the most  common conditions requiring medical  attention...11Jaundice is one of the most  common conditions requiring medical  attention...
11Jaundice is one of the most common conditions requiring medical attention...
 
Phototherapyhospital-website-project-proposal.pptx
Phototherapyhospital-website-project-proposal.pptxPhototherapyhospital-website-project-proposal.pptx
Phototherapyhospital-website-project-proposal.pptx
 
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
1617ventilator tester analysis ppt36-leonardo-da-vinci-template-16x9.pptx
 
L4-IntroducClick to edit Master title styletion to logic.pptx
L4-IntroducClick to edit Master title styletion to logic.pptxL4-IntroducClick to edit Master title styletion to logic.pptx
L4-IntroducClick to edit Master title styletion to logic.pptx
 
L9-files fClick to edit Master title styleormat.pptx
L9-files fClick to edit Master title styleormat.pptxL9-files fClick to edit Master title styleormat.pptx
L9-files fClick to edit Master title styleormat.pptx
 
60Click to edit Master title style467.ppt
60Click to edit Master title style467.ppt60Click to edit Master title style467.ppt
60Click to edit Master title style467.ppt
 
Click to edit Master title styleClick to edit Master title style
Click to edit Master title styleClick to edit Master title styleClick to edit Master title styleClick to edit Master title style
Click to edit Master title styleClick to edit Master title style
 

Recently uploaded

Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...Pooja Nehwal
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...babafaisel
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Douxkojalkojal131
 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Delhi Call girls
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxjeswinjees
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfParomita Roy
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Delhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵anilsa9823
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girlsmodelanjalisharma4
 
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️soniya singh
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...kumaririma588
 
Petrosains Drama Competition (PSDC).pptx
Petrosains Drama Competition (PSDC).pptxPetrosains Drama Competition (PSDC).pptx
Petrosains Drama Competition (PSDC).pptxIgnatiusAbrahamBalin
 
SD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptxSD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptxjanettecruzeiro1
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...Suhani Kapoor
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Call Girls in Nagpur High Profile
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsCharles Obaleagbon
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfAmirYakdi
 

Recently uploaded (20)

Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptx
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
 
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
 
Petrosains Drama Competition (PSDC).pptx
Petrosains Drama Competition (PSDC).pptxPetrosains Drama Competition (PSDC).pptx
Petrosains Drama Competition (PSDC).pptx
 
SD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptxSD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptx
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past Questions
 
escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
 

Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g of this compound

  • 1. FIREWALLS AND INTRUSION PREVENTION SYSTEMS CS432: Network Security
  • 2. The Need For Firewalls     Internet connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link Can be a single computer system or a set of two or more systems working together Used as a perimeter defence Single choke point to impose security and auditing Insulates the internal systems from external networks 2
  • 3. Firewall Characteristics   Design goals: All traffic from inside to outside must pass through the firewall Only authorized traffic as defined by the local security policy will be allowed to pass The firewall itself is immune to penetration Techniques used by firewalls to control access and enforce the site’s security policy are: Service control Direction control User control Behavior control 3
  • 4. Firewall Capabilities and Limits   Capabilities: Defines a single choke point Provides a location for monitoring security events Convenient platform for several Internet functions that are not security related Can serve as the platform for IPSec Limitations: Cannot protect against attacks bypassing firewall May not protect fully against internal threats Improperly secured wireless LAN can be accessed from outside the organization Laptop, PDA, or portable storage device may be infected outside the corporate network then used internally 4
  • 7. Packet Filtering Firewall      Applies rules to each incoming and outgoing IP packet Typically a list of rules based on matches in the IP or TCP header Forwards or discards the packet based on rules match Filtering rules are based on information contained in a network packet Source IP address Destination IP address Source and destination transport-level address IP protocol field Interface Two default policies: Discard - prohibit unless expressly permitted More conservative, controlled, visible to users Forward - permit unless expressly prohibited Easier to manage and use but less secure 7
  • 10. Advantages and Weaknesses      Advantages Simplicity Typically transparent to users and are very fast Weaknesses Cannot prevent attacks that employ application specific vulnerabilities or functions Limited logging functionality Do not support advanced user authentication Vulnerable to attacks on TCP/IP protocol bugs IP spoofing attacks Source routing attacks Tiny fragment attacks Improper configuration can lead to breaches 10
  • 11. Stateful Inspection Firewall   Tightens rules for TCP traffic by creating a directory of outbound TCP connections There is an entry for each currently established connection Packet filter allows incoming traffic to high numbered ports only for those packets that fit the profile of one of the entries in this directory Reviews packet information but also records information about TCP connections Keeps track of TCP sequence numbers to prevent attacks that depend on the sequence number Inspects data for protocols like FTP, IM and SIPS commands 11
  • 12. Stateful Firewall Connection State Example 12
  • 13. Application-Level Gateway      Also called an application proxy Acts as a relay of application-level traffic User contacts gateway using a TCP/IP application User is authenticated Gateway contacts application on remote host and relays TCP segments between server and user Must have proxy code for each application May restrict application features supported Tend to be more secure than packet filters Disadvantage: Additional processing overhead on each connection 13
  • 14. Circuit-Level Gateway Circuit level proxy • • • Sets up two TCP connections, one between itself and a TCP user on an inner host and one on an outside host Relays TCP segments from one connection to the other without examining contents Security function consists of determining which connections will be allowed Typically used when inside users are trusted • • May use application-level gateway inbound and circuit-level gateway outbound Lower overheads 14
  • 15. SOCKS Circuit-Level Gateway     SOCKS v5 defined in RFC1928 Designed to provide a framework for client- server applications in TCP/UDP domains to conveniently and securely use the services of a network firewall Client application contacts SOCKS server, authenticates, sends relay request Server evaluates and either establishes or denies the connection Components: SOCKS server SOCKS client library SOCKS-ified client applications 15
  • 16. Bastion Hosts    System identified as a critical strong point in the network’s security Serves as a platform for an application-level or circuit-level gateway Common characteristics: Runs secure O/S, only essential services May require user authentication to access proxy or host Each proxy can restrict features, hosts accessed Each proxy is small, simple, checked for security Each proxy is independent, non-privileged Limited disk use, hence read-only code 16
  • 17. Host-Based Firewalls      Used to secure an individual host Available in operating systems or can be provided as an add-on package Filter and restrict packet flows Common location is a server Advantages: Filtering rules can be tailored to the host environment Protection is provided independent of topology Provides an additional layer of protection 17
  • 18. Personal Firewall        Controls traffic between a personal computer or workstation and the Internet or enterprise network For both home or corporate use Typically is a software module on a personal computer Can be housed in a router that connects all of the home computers to a DSL, cable modem, or other Internet interface Typically much less complex than server-based or stand- alone firewalls Primary role is to deny unauthorized remote access May also monitor outgoing traffic to detect and block worms and malware activity 18
  • 19. Example Firewall Configuration - DMZ Networks 19
  • 20. DMZ Networks 20       DMZ (demilitarized zone) A region between internal and external firewalls External firewall Placed at the edge of a local or enterprise network Measure of access control and protection for the DMZ systems Internal firewall Protect the bulk of the enterprise network Provides a basic level of protection for the remainder of the network Purposes: Adds more stringent filtering capability Provides two-way protection with respect to the DMZ Used to protect portions of the internal network from each other
  • 21. Virtual Private Networks (VPNs) 21   VPN consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security Example IPSec
  • 23. Example Distributed Firewall Configuration 23
  • 24. Firewall Topologies • Includes personal firewall software and firewall software on servers Host-resident firewall • Single router between internal and external networks with stateless or full packet filtering Screening router • Single firewall device between an internal and external router Single bastion inline • has a third network interface on bastion to a DMZ where externally visible servers are placed Single bastion T • DMZ is sandwiched between bastion firewalls Double bastion inline • DMZ is on a separate network interface on the bastion firewall Double bastion T • Used by large businesses and government organizations Distributed firewall configuration 24
  • 25. Intrusion Prevention Systems (IPS)     Recent addition to security products Inline network-based IDS that can block traffic Functional addition to firewall that adds IDS capabilities Can block traffic like a firewall Makes use of algorithms developed for IDSs May be network or host based 25
  • 26. Host-Based IPS (HIPS)     Identifies attacks using both signature and anomaly detection techniques Signature: focus is on the specific content of application payloads in packets, looking for patterns that have been identified as malicious Anomaly: IPS is looking for behavior patterns that indicate malware Can be tailored to the specific platform Can also use a sandbox approach to monitor behavior Advantages: The various tools work closely together Threat prevention is more comprehensive Management is easier 26
  • 27. Network-Based IPS (NIPS)     Inline NIDS with the authority to discard packets and tear down TCP connections Uses signature and anomaly detection May provide flow data protection Monitoring full application flow content Can identify malicious packets using: Pattern matching Stateful matching Protocol anomaly Traffic anomaly Statistical anomaly 27
  • 28. Snort Inline      Enables Snort to function as an intrusion prevention capability Includes a replace option which allows the Snort user to modify packets rather than drop them Useful for a honeypot implementation Attackers see the failure but can’t figure out why it occurred Operations: drop Snort rejects a packet based on the options defined in the rule and logs the result reject packet is rejected and result is logged and an error message is returned Sdrop packet is rejected but not logged 28