SlideShare a Scribd company logo
1 of 39
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
1
ο‚ž World wide enterprise loss just because of a
simple My Doom email virus is $22.6 Billion.
ο‚ž Plus negative social impact on these enterprises
which is worth a trillion dollar.
ο‚ž Enterprises are now freely communicating
beyond boundaries.
ο‚ž The trade off is they have to pass through
dangerous avenues to reach each other.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
ο‚ž A properly designed and implemented security
policy is an absolute requirement for all types of
enterprises
ο‚ž a solid approach to network security not only
ensures security of your network, but your
overall network reliability, resiliency, business
continuity and business productivity.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
ο‚ž The most basic, fundamental type of firewall is
called a packet filter.
ο‚ž Packet filter fire-walls are essentially routing
devices that include access control functionality
for system addresses and communication
sessions.
ο‚ž The access control functionality of a packet filter
firewall is governed by a set of directives
collectively referred to as a ruleset.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
ο‚ž packet filters operate at Layer 3 (Network) of the
OSI model.
ο‚ž This basic functionality is designed to provide
network access control based upon several
pieces of information contained in a network
packet:
ο‚ž The source address of the packet, L3 address of
the device the network packet originated from
(an IP address such as 192.168.1.1).
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
ο‚ž The destination address of the packet, L3
address of device the network packet is trying to
reach (e.g., 192.168.1.2).
ο‚ž The type of traffic, i.e., specific protocol
ο‚ž characteristics of the Layer 4 communications
sessions- source and destination ports of the
sessions
ο‚ž information pertaining interface, i.e., source and
destination interface
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
ο‚ž Packet filter firewalls have two main strengths:
speed and flexibility.
ο‚ž Since packet filters do not usually examine data
above Layer 3 of the OSI model, they can
operate very quickly.
ο‚ž since most modern network protocols can be
accommodated using Layer 3 and below, packet
filter firewalls can be used to secure nearly any
type of network communication or protocol.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
ο‚ž They are able to block denial-of-service and
related attacks, makes them ideal for placement
at the outermost boundary with an untrusted
network.
ο‚ž Packet filter routers are thus also called
Boundary Routers
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
ο‚ž cannot prevent attacks that employ application-
specific vulnerabilities or functions.
ο‚ž For example, a packet filter firewall cannot block
specific application commands; if a packet filter
firewall allows a given application, all functions
available within that application will be
permitted.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
ο‚ž the logging functionality present in packet filter
firewalls is limited.
ο‚ž Packet filter logs normally contain the same
information used to make access control
decisions (source address, destination address,
and traffic type).
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
ο‚ž do not support advanced user authentication
schemes.
ο‚ž this limitation is mostly due to the lack of upper-
layer functionality by the firewall.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
ο‚ž vulnerable to attacks and exploits that take
advantage of problems within the TCP/IP
specification and protocol stack, such as network
layer address spoofing.
ο‚ž packet filter firewalls cannot detect a network
packet in which the OSI Layer 3 addressing
information has been altered.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
ο‚ž susceptible to security breaches caused by
improper configurations.
ο‚ž it is easy to accidentally configure a packet filter
firewall to allow traf-fic types, sources, and
destinations that should be denied based upon
an organization.s information security policy.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15
ο‚ž packet filter firewalls are very suitable for high-
speed environments where logging and user
authentication with network resources are not
important.
ο‚ž Most SOHO (Small Office Home Office) firewall
appliances and default operating system
firewalls are packet filter firewalls.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 16
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 17
ο‚ž the firewall passes the packet through the
firewall as requested
ο‚ž subject to whatever logging capabilities may or
may not be in place.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 18
ο‚ž the firewall drops the packet, without passing it
through the firewall.
ο‚ž Once the packet is dropped, an error message is
returned to the source system.
ο‚ž may or may not generate log entries depending
on the firewall’s ruleset configuration.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 19
ο‚ž the firewall not only drops the packet, but it
does not return an error message to the source
system.
ο‚ž This particular action is used to implement the
black hole.
ο‚ž methodology in which a firewall does not reveal
its presence to an outsider.
ο‚ž may or may not generate log entries.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 20
ο‚ž Stateful inspection firewalls are packet filters
that incorporate added awareness of the OSI
model data at Layer 4
ο‚ž When a TCP (connection-oriented transport)
application creates a session with a remote host
system, a port is also created on the source
system for the purpose of receiving network
traffic from the destination system.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 21
ο‚ž According to the TCP specifications, this client
source port will be some number greater than
1023 and less than 16384.
ο‚ž According to convention, the destination port on
the re-mote host will likely be a .low-numbered.
port, less than 1024. This will be 25 for SMTP, for
example.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 22
ο‚ž Packet filter firewalls must permit inbound
network traffic on all of these .high-numbered.
ο‚ž ports for connection-oriented transport to
occur, i.e., return packets from the destination
system.
ο‚ž Opening this many ports creates an immense
risk of intrusion by un-authorized users who may
employ a variety of techniques to abuse the
expected conventions.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 23
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 24
ο‚ž Each individual application-proxy, also referred
to as a proxy agent, interfaces directly with the
firewall access control ruleset
ο‚ž determines whether a given piece of network
traffic should be permitted to transit the
firewall.
ο‚ž In addition to the ruleset, each proxy agent has
the ability to require authentication of each
individual network user.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 25
ο‚ž This user authentication can take many forms,
including the following:
1. User ID and Password Authentication,
2. Hardware or Software Token Authentication,
3. Source Address Authentication, and
4. Biometric Authentication.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 26
ο‚ž application-proxy gateway fire-walls usually
have more extensive logging capabilities
ο‚ž able to examine the entire network packet
rather than just the network addresses and
ports.
ο‚ž Enables enterprise security policy with
authentication mechanism
ο‚ž less vulnerable to address spoofing attacks.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 27
ο‚ž the firewall is forced to spend quite a bit of time
reading and interpreting each packet.
ο‚ž For this reason, application-proxy gateway
firewalls are not generally well suited to high-
bandwidth or real-time applications.
ο‚ž Another disadvantage is that application-proxy
gateway firewalls tend to be limited in terms of
support for new network applications and
protocols.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 28
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 29
ο‚ž Mixing up packet filtering/ stateful inspection
with application gateway proxy firewalls
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 30
ο‚ž The most common firewall environment
implementation is known as a DMZ, or DeMilita-
rized Zone network.
ο‚ž A DMZ network is created out of a network
connecting two firewalls
ο‚ž when two or more firewalls exist in an
environment, the networks connecting the fire-
walls can be DMZ networks.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 31
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 32
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 33
ο‚ž This configuration subjects the firewall to an
increased risk of service degradation during a
denial-of-service (DOS) attack aimed at servers
located on the DMZ.
ο‚ž In a standard DMZ network configuration, a
denial-of-service attack against a DMZ-attached
resource such as a web server will likely impact
only that target resource.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 34
ο‚ž A virtual private network is constructed on top
of existing network media and protocols by
using additional protocols and usually,
encryption.
ο‚ž virtual private networks are used to provide
secure network links across net-works that are
not trusted.
ο‚ž virtual private networks are used to provide
secure network links across net-works that are
not trusted.Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 35
ο‚ž virtual private network technology is increasingly
used in the area of providing remote user access
to organizational networks via the global
Internet.
ο‚ž By using virtual private network technology, an
organization purchases a single connection to
the global Internet, and that connection is used
to allow remote users access into otherwise pri-
vate networks and resources.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 36
ο‚ž This single Internet connection can also be used
to provide many other types of services. As a
result, this mechanism is considered to be cost-
effective.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 37
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 38
ο‚ž On the protocol level, there are several possible
choices for a modern virtual private net-work.
ο‚ž The first, and perhaps the most currently used is
a set of protocols known as IPSec
ο‚ž The IPSec standards consist of IPv6 security
features ported over to IPv4
ο‚ž Other current VPN protocols include PPTP, a
Microsoft standard, and the L2TP
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 39

More Related Content

What's hot

Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016IJERA Editor
Β 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)Rushdi Shams
Β 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideErica StJohn
Β 
10. sig free a signature free buffer overflow attack blocker
10.  sig free a signature free buffer overflow attack blocker10.  sig free a signature free buffer overflow attack blocker
10. sig free a signature free buffer overflow attack blockerakila_mano
Β 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
Β 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A ReviewIRJET Journal
Β 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANEditor IJCATR
Β 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.finalAlexisHarvey8
Β 
Wp ci securing_layer2
Wp ci securing_layer2Wp ci securing_layer2
Wp ci securing_layer2Amargo Durazno
Β 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkSalam Shah
Β 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksIOSR Journals
Β 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
Β 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494IJERA Editor
Β 
T04506110115
T04506110115T04506110115
T04506110115IJERA Editor
Β 

What's hot (17)

Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016
Β 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)
Β 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
Β 
10. sig free a signature free buffer overflow attack blocker
10.  sig free a signature free buffer overflow attack blocker10.  sig free a signature free buffer overflow attack blocker
10. sig free a signature free buffer overflow attack blocker
Β 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
Β 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Β 
complete_thesis
complete_thesiscomplete_thesis
complete_thesis
Β 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
Β 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Β 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
Β 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
Β 
Wp ci securing_layer2
Wp ci securing_layer2Wp ci securing_layer2
Wp ci securing_layer2
Β 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
Β 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Β 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
Β 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
Β 
T04506110115
T04506110115T04506110115
T04506110115
Β 

Viewers also liked

Lec 09. Introduction to Functions / Call by Values
Lec 09. Introduction to Functions / Call by ValuesLec 09. Introduction to Functions / Call by Values
Lec 09. Introduction to Functions / Call by ValuesRushdi Shams
Β 
Lec 02. C Program Structure / C Memory Concept
Lec 02. C Program Structure / C Memory ConceptLec 02. C Program Structure / C Memory Concept
Lec 02. C Program Structure / C Memory ConceptRushdi Shams
Β 
Lec 15. Pointers and Arrays
Lec 15. Pointers and ArraysLec 15. Pointers and Arrays
Lec 15. Pointers and ArraysRushdi Shams
Β 
Probabilistic logic
Probabilistic logicProbabilistic logic
Probabilistic logicRushdi Shams
Β 
Lec 23. Files (Part II)
Lec 23. Files (Part II)Lec 23. Files (Part II)
Lec 23. Files (Part II)Rushdi Shams
Β 
L14 l15 Object Oriented DBMS
L14 l15  Object Oriented DBMSL14 l15  Object Oriented DBMS
L14 l15 Object Oriented DBMSRushdi Shams
Β 
L4 domain integrity
L4  domain integrityL4  domain integrity
L4 domain integrityRushdi Shams
Β 
L9 l10 server side programming
L9 l10  server side programmingL9 l10  server side programming
L9 l10 server side programmingRushdi Shams
Β 

Viewers also liked (8)

Lec 09. Introduction to Functions / Call by Values
Lec 09. Introduction to Functions / Call by ValuesLec 09. Introduction to Functions / Call by Values
Lec 09. Introduction to Functions / Call by Values
Β 
Lec 02. C Program Structure / C Memory Concept
Lec 02. C Program Structure / C Memory ConceptLec 02. C Program Structure / C Memory Concept
Lec 02. C Program Structure / C Memory Concept
Β 
Lec 15. Pointers and Arrays
Lec 15. Pointers and ArraysLec 15. Pointers and Arrays
Lec 15. Pointers and Arrays
Β 
Probabilistic logic
Probabilistic logicProbabilistic logic
Probabilistic logic
Β 
Lec 23. Files (Part II)
Lec 23. Files (Part II)Lec 23. Files (Part II)
Lec 23. Files (Part II)
Β 
L14 l15 Object Oriented DBMS
L14 l15  Object Oriented DBMSL14 l15  Object Oriented DBMS
L14 l15 Object Oriented DBMS
Β 
L4 domain integrity
L4  domain integrityL4  domain integrity
L4 domain integrity
Β 
L9 l10 server side programming
L9 l10  server side programmingL9 l10  server side programming
L9 l10 server side programming
Β 

Similar to L3 defense

ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfMeymunaMohammed1
Β 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
Β 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
Β 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architecturesArun Mahajan
Β 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.pptRaj Kumar
Β 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configurationNutan Kumar Panda
Β 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmzBaha Rababah
Β 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architectureWen Zhu
Β 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?ezoicxcom
Β 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?haq107457
Β 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...FahmiOlayah
Β 
Improving Firewall Performance by Eliminating Redundancies In Access Control ...
Improving Firewall Performance by Eliminating Redundancies In Access Control ...Improving Firewall Performance by Eliminating Redundancies In Access Control ...
Improving Firewall Performance by Eliminating Redundancies In Access Control ...CSCJournals
Β 

Similar to L3 defense (20)

ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
Β 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Β 
L4 vpn
L4  vpnL4  vpn
L4 vpn
Β 
Firewall
Firewall Firewall
Firewall
Β 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
Β 
Web security
Web securityWeb security
Web security
Β 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
Β 
Firewalls
FirewallsFirewalls
Firewalls
Β 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
Β 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Β 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmz
Β 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architecture
Β 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
Β 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
Β 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Β 
Cr32585591
Cr32585591Cr32585591
Cr32585591
Β 
Firewalls
FirewallsFirewalls
Firewalls
Β 
Firewall
FirewallFirewall
Firewall
Β 
Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
Β 
Improving Firewall Performance by Eliminating Redundancies In Access Control ...
Improving Firewall Performance by Eliminating Redundancies In Access Control ...Improving Firewall Performance by Eliminating Redundancies In Access Control ...
Improving Firewall Performance by Eliminating Redundancies In Access Control ...
Β 

More from Rushdi Shams

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchRushdi Shams
Β 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IRRushdi Shams
Β 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101Rushdi Shams
Β 
Semi-supervised classification for natural language processing
Semi-supervised classification for natural language processingSemi-supervised classification for natural language processing
Semi-supervised classification for natural language processingRushdi Shams
Β 
Natural Language Processing: Parsing
Natural Language Processing: ParsingNatural Language Processing: Parsing
Natural Language Processing: ParsingRushdi Shams
Β 
Types of machine translation
Types of machine translationTypes of machine translation
Types of machine translationRushdi Shams
Β 
L1 l2 l3 introduction to machine translation
L1 l2 l3  introduction to machine translationL1 l2 l3  introduction to machine translation
L1 l2 l3 introduction to machine translationRushdi Shams
Β 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semanticsRushdi Shams
Β 
Propositional logic
Propositional logicPropositional logic
Propositional logicRushdi Shams
Β 
L15 fuzzy logic
L15  fuzzy logicL15  fuzzy logic
L15 fuzzy logicRushdi Shams
Β 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structureRushdi Shams
Β 
Knowledge representation
Knowledge representationKnowledge representation
Knowledge representationRushdi Shams
Β 
First order logic
First order logicFirst order logic
First order logicRushdi Shams
Β 
Belief function
Belief functionBelief function
Belief functionRushdi Shams
Β 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hackingRushdi Shams
Β 
L2 l3 l4 software process models
L2 l3 l4  software process modelsL2 l3 l4  software process models
L2 l3 l4 software process modelsRushdi Shams
Β 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineeringRushdi Shams
Β 
L13 why software fails
L13  why software failsL13  why software fails
L13 why software failsRushdi Shams
Β 
Lecture 14,15 and 16 file systems
Lecture 14,15 and 16  file systemsLecture 14,15 and 16  file systems
Lecture 14,15 and 16 file systemsRushdi Shams
Β 

More from Rushdi Shams (20)

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better Research
Β 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IR
Β 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101
Β 
Semi-supervised classification for natural language processing
Semi-supervised classification for natural language processingSemi-supervised classification for natural language processing
Semi-supervised classification for natural language processing
Β 
Natural Language Processing: Parsing
Natural Language Processing: ParsingNatural Language Processing: Parsing
Natural Language Processing: Parsing
Β 
Types of machine translation
Types of machine translationTypes of machine translation
Types of machine translation
Β 
L1 l2 l3 introduction to machine translation
L1 l2 l3  introduction to machine translationL1 l2 l3  introduction to machine translation
L1 l2 l3 introduction to machine translation
Β 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semantics
Β 
Propositional logic
Propositional logicPropositional logic
Propositional logic
Β 
L15 fuzzy logic
L15  fuzzy logicL15  fuzzy logic
L15 fuzzy logic
Β 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structure
Β 
Knowledge representation
Knowledge representationKnowledge representation
Knowledge representation
Β 
First order logic
First order logicFirst order logic
First order logic
Β 
Belief function
Belief functionBelief function
Belief function
Β 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hacking
Β 
L1 phishing
L1  phishingL1  phishing
L1 phishing
Β 
L2 l3 l4 software process models
L2 l3 l4  software process modelsL2 l3 l4  software process models
L2 l3 l4 software process models
Β 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineering
Β 
L13 why software fails
L13  why software failsL13  why software fails
L13 why software fails
Β 
Lecture 14,15 and 16 file systems
Lecture 14,15 and 16  file systemsLecture 14,15 and 16  file systems
Lecture 14,15 and 16 file systems
Β 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Β 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
Β 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
Β 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
Β 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Β 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
Β 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
Β 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
Β 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
Β 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Β 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
Β 
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhisoniya singh
Β 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
Β 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
Β 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
Β 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Β 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
Β 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
Β 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Β 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Β 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Β 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Β 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Β 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Β 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Β 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Β 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Β 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Β 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
Β 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Β 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Β 
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
Β 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Β 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Β 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Β 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Β 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Β 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Β 

L3 defense

  • 1. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 1
  • 2. ο‚ž World wide enterprise loss just because of a simple My Doom email virus is $22.6 Billion. ο‚ž Plus negative social impact on these enterprises which is worth a trillion dollar. ο‚ž Enterprises are now freely communicating beyond boundaries. ο‚ž The trade off is they have to pass through dangerous avenues to reach each other. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
  • 3. ο‚ž A properly designed and implemented security policy is an absolute requirement for all types of enterprises ο‚ž a solid approach to network security not only ensures security of your network, but your overall network reliability, resiliency, business continuity and business productivity. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
  • 4. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
  • 5. ο‚ž The most basic, fundamental type of firewall is called a packet filter. ο‚ž Packet filter fire-walls are essentially routing devices that include access control functionality for system addresses and communication sessions. ο‚ž The access control functionality of a packet filter firewall is governed by a set of directives collectively referred to as a ruleset. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
  • 6. ο‚ž packet filters operate at Layer 3 (Network) of the OSI model. ο‚ž This basic functionality is designed to provide network access control based upon several pieces of information contained in a network packet: ο‚ž The source address of the packet, L3 address of the device the network packet originated from (an IP address such as 192.168.1.1). Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
  • 7. ο‚ž The destination address of the packet, L3 address of device the network packet is trying to reach (e.g., 192.168.1.2). ο‚ž The type of traffic, i.e., specific protocol ο‚ž characteristics of the Layer 4 communications sessions- source and destination ports of the sessions ο‚ž information pertaining interface, i.e., source and destination interface Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
  • 8. ο‚ž Packet filter firewalls have two main strengths: speed and flexibility. ο‚ž Since packet filters do not usually examine data above Layer 3 of the OSI model, they can operate very quickly. ο‚ž since most modern network protocols can be accommodated using Layer 3 and below, packet filter firewalls can be used to secure nearly any type of network communication or protocol. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
  • 9. ο‚ž They are able to block denial-of-service and related attacks, makes them ideal for placement at the outermost boundary with an untrusted network. ο‚ž Packet filter routers are thus also called Boundary Routers Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
  • 10. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
  • 11. ο‚ž cannot prevent attacks that employ application- specific vulnerabilities or functions. ο‚ž For example, a packet filter firewall cannot block specific application commands; if a packet filter firewall allows a given application, all functions available within that application will be permitted. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
  • 12. ο‚ž the logging functionality present in packet filter firewalls is limited. ο‚ž Packet filter logs normally contain the same information used to make access control decisions (source address, destination address, and traffic type). Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
  • 13. ο‚ž do not support advanced user authentication schemes. ο‚ž this limitation is mostly due to the lack of upper- layer functionality by the firewall. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
  • 14. ο‚ž vulnerable to attacks and exploits that take advantage of problems within the TCP/IP specification and protocol stack, such as network layer address spoofing. ο‚ž packet filter firewalls cannot detect a network packet in which the OSI Layer 3 addressing information has been altered. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
  • 15. ο‚ž susceptible to security breaches caused by improper configurations. ο‚ž it is easy to accidentally configure a packet filter firewall to allow traf-fic types, sources, and destinations that should be denied based upon an organization.s information security policy. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15
  • 16. ο‚ž packet filter firewalls are very suitable for high- speed environments where logging and user authentication with network resources are not important. ο‚ž Most SOHO (Small Office Home Office) firewall appliances and default operating system firewalls are packet filter firewalls. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 16
  • 17. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 17
  • 18. ο‚ž the firewall passes the packet through the firewall as requested ο‚ž subject to whatever logging capabilities may or may not be in place. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 18
  • 19. ο‚ž the firewall drops the packet, without passing it through the firewall. ο‚ž Once the packet is dropped, an error message is returned to the source system. ο‚ž may or may not generate log entries depending on the firewall’s ruleset configuration. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 19
  • 20. ο‚ž the firewall not only drops the packet, but it does not return an error message to the source system. ο‚ž This particular action is used to implement the black hole. ο‚ž methodology in which a firewall does not reveal its presence to an outsider. ο‚ž may or may not generate log entries. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 20
  • 21. ο‚ž Stateful inspection firewalls are packet filters that incorporate added awareness of the OSI model data at Layer 4 ο‚ž When a TCP (connection-oriented transport) application creates a session with a remote host system, a port is also created on the source system for the purpose of receiving network traffic from the destination system. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 21
  • 22. ο‚ž According to the TCP specifications, this client source port will be some number greater than 1023 and less than 16384. ο‚ž According to convention, the destination port on the re-mote host will likely be a .low-numbered. port, less than 1024. This will be 25 for SMTP, for example. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 22
  • 23. ο‚ž Packet filter firewalls must permit inbound network traffic on all of these .high-numbered. ο‚ž ports for connection-oriented transport to occur, i.e., return packets from the destination system. ο‚ž Opening this many ports creates an immense risk of intrusion by un-authorized users who may employ a variety of techniques to abuse the expected conventions. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 23
  • 24. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 24
  • 25. ο‚ž Each individual application-proxy, also referred to as a proxy agent, interfaces directly with the firewall access control ruleset ο‚ž determines whether a given piece of network traffic should be permitted to transit the firewall. ο‚ž In addition to the ruleset, each proxy agent has the ability to require authentication of each individual network user. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 25
  • 26. ο‚ž This user authentication can take many forms, including the following: 1. User ID and Password Authentication, 2. Hardware or Software Token Authentication, 3. Source Address Authentication, and 4. Biometric Authentication. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 26
  • 27. ο‚ž application-proxy gateway fire-walls usually have more extensive logging capabilities ο‚ž able to examine the entire network packet rather than just the network addresses and ports. ο‚ž Enables enterprise security policy with authentication mechanism ο‚ž less vulnerable to address spoofing attacks. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 27
  • 28. ο‚ž the firewall is forced to spend quite a bit of time reading and interpreting each packet. ο‚ž For this reason, application-proxy gateway firewalls are not generally well suited to high- bandwidth or real-time applications. ο‚ž Another disadvantage is that application-proxy gateway firewalls tend to be limited in terms of support for new network applications and protocols. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 28
  • 29. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 29
  • 30. ο‚ž Mixing up packet filtering/ stateful inspection with application gateway proxy firewalls Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 30
  • 31. ο‚ž The most common firewall environment implementation is known as a DMZ, or DeMilita- rized Zone network. ο‚ž A DMZ network is created out of a network connecting two firewalls ο‚ž when two or more firewalls exist in an environment, the networks connecting the fire- walls can be DMZ networks. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 31
  • 32. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 32
  • 33. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 33
  • 34. ο‚ž This configuration subjects the firewall to an increased risk of service degradation during a denial-of-service (DOS) attack aimed at servers located on the DMZ. ο‚ž In a standard DMZ network configuration, a denial-of-service attack against a DMZ-attached resource such as a web server will likely impact only that target resource. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 34
  • 35. ο‚ž A virtual private network is constructed on top of existing network media and protocols by using additional protocols and usually, encryption. ο‚ž virtual private networks are used to provide secure network links across net-works that are not trusted. ο‚ž virtual private networks are used to provide secure network links across net-works that are not trusted.Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 35
  • 36. ο‚ž virtual private network technology is increasingly used in the area of providing remote user access to organizational networks via the global Internet. ο‚ž By using virtual private network technology, an organization purchases a single connection to the global Internet, and that connection is used to allow remote users access into otherwise pri- vate networks and resources. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 36
  • 37. ο‚ž This single Internet connection can also be used to provide many other types of services. As a result, this mechanism is considered to be cost- effective. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 37
  • 38. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 38
  • 39. ο‚ž On the protocol level, there are several possible choices for a modern virtual private net-work. ο‚ž The first, and perhaps the most currently used is a set of protocols known as IPSec ο‚ž The IPSec standards consist of IPv6 security features ported over to IPv4 ο‚ž Other current VPN protocols include PPTP, a Microsoft standard, and the L2TP Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 39