Computer Security: Principles and Practice. Firewalls and Intrusion Prevention Systems. Chapter 9 презентация

Содержание


Презентации» Информатика» Computer Security: Principles and Practice. Firewalls and Intrusion Prevention Systems. Chapter 9
Computer Security: Principles and Practice
 EECS710: Information Security
 Professor Hossein Saiedian
Firewalls and Intrusion Prevention Systems
 Effective means of protecting LANs
 InternetFirewall Access Policy
 A critical component in the planning and implementationFirewall Capabilities & Limits
 Capabilities
 Defines a single choke point
 ProvidesFirewall Filter CharacteristicsTypes of FirewallsPacket Filtering Firewall
 Applies rules to packets in/out of firewall
 basedPacket Filter RulesPacket Filter RulesPacket Filter Weaknesses
 Weaknesses
 Cannot prevent attack on application bugs
 LimitedStateful Inspection Firewall
 Reviews packet header information but also keeps infoConnection State TableApplication-Level (Proxy) Gateway
 Acts as a relay of application-level traffic
 UserCircuit-Level Gateway
 Sets up two TCP connections, to an inside userPacket Filtering vs Gateway vs Application-Level FirewallSOCKS Circuit-Level Gateway 
 SOCKS v5 defined as RFC1928 to allowFirewall Basing
 Several options for locating firewall:
 Bastion host
 Individual host-basedBastion Hosts
 Critical strongpoint in network
 Hosts application/circuit-level gateways
 Common characteristics:
Host-Based Firewalls
 Used to secure individual host
 Available in/add-on for manyPersonal Firewall
 Controls traffic flow to/from PC/workstation
 For both home orFirewall LocationsVirtual Private NetworksDistributed FirewallsFirewall Topologies
 Host-resident firewall: personal firewall and firewall on servers (usedIntrusion Prevention Systems (IPS)
 Recent addition to security products which
 InlineHost-Based IPS
 Identifies attacks using both:
 Signature techniques
 malicious application packets
Network-Based IPS
 inline NIDS that can discard packets or terminate TCPUnified Threat Management ProductsSummary
 Introduced need for & purpose of firewalls
 Types of firewalls



Слайды и текст этой презентации
Слайд 1
Описание слайда:
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014


Слайд 2
Описание слайда:
Firewalls and Intrusion Prevention Systems Effective means of protecting LANs Internet connectivity is essential For organization and individuals But creates a threat (enabling the outside world to reach and interact with local network assets) Could secure all workstations and servers (but this is not a practical approach) Also use firewall as perimeter defence Single choke point to impose security

Слайд 3
Описание слайда:
Firewall Access Policy A critical component in the planning and implementation of a firewall is specifying a suitable access policy Types of traffic authorized to pass through the firewall Includes address ranges, protocols, applications and content types The policy should be developed from the organization’s security risk assessment and policy Should be developed from a broad specification of which traffic types the organization needs to support Then refined to detail the filter elements which can then be implemented within an appropriate firewall topology

Слайд 4
Описание слайда:
Firewall Capabilities & Limits Capabilities Defines a single choke point Provides a location for monitoring security events Convenient platform for some Internet functions such as NAT, usage monitoring, IPSEC, VPNs Limitations Cannot protect against attacks bypassing firewall (from dial-out, or a modem pool dial-in capability for traveling employees and telecommuters) May not protect fully against internal threats Improperly secure wireless LAN Laptop, PDA, portable storage device infected outside then used inside

Слайд 5
Описание слайда:
Firewall Filter Characteristics

Слайд 6
Описание слайда:
Types of Firewalls

Слайд 7
Описание слайда:
Packet Filtering Firewall Applies rules to packets in/out of firewall based on information in packet header src/dest IP addr & port, IP protocol, interface Typically a list of rules of matches on fields If match rule says if forward or discard packet Two default policies: Discard: prohibit unless expressly permitted more conservative, controlled, visible to users Forward: permit unless expressly prohibited easier to manage/use but less secure

Слайд 8
Описание слайда:
Packet Filter Rules

Слайд 9
Описание слайда:
Packet Filter Rules

Слайд 10
Описание слайда:
Packet Filter Weaknesses Weaknesses Cannot prevent attack on application bugs Limited logging functionality Do no support advanced user authentication Vulnerable to attacks on TCP/IP protocol bugs (e.g., IP address spoofing) Improper configuration can lead to breaches Attacks IP address spoofing Source route attacks (srs dictates the pkt route) Tiny fragment attacks (to circumvent filtering rules that depend on TCP header info)

Слайд 11
Описание слайда:
Stateful Inspection Firewall Reviews packet header information but also keeps info on TCP connections Typically have low, “known” port # for server and high, dynamically assigned (ephemeral) client port # Stateful inspection packet firewall tightens rules for TCP traffic using a directory of TCP connections only allow incoming traffic to high-numbered ports for packets matching an entry in this directory may also track TCP seq numbers as well

Слайд 12
Описание слайда:
Connection State Table

Слайд 13
Описание слайда:
Application-Level (Proxy) Gateway Acts as a relay of application-level traffic User contacts gateway with remote host name Authenticates themselves Gateway contacts application on remote host and relays TCP segments between server and user Must have proxy code for each application May restrict application features supported Some services may not be available More secure than packet filters But have higher overheads

Слайд 14
Описание слайда:
Circuit-Level Gateway Sets up two TCP connections, to an inside user and to an outside host Once connection is established, relays TCP segments from one connection to the other without examining contents Hence independent of application logic Just determines whether relay is permitted Typically used when inside users trusted May use application-level gateway inbound and circuit-level gateway outbound Hence lower overheads

Слайд 15
Описание слайда:
Packet Filtering vs Gateway vs Application-Level Firewall

Слайд 16
Описание слайда:
SOCKS Circuit-Level Gateway SOCKS v5 defined as RFC1928 to allow TCP/UDP applications to use firewall Components: SOCKS server on firewall SOCKS client library on all internal hosts SOCKS-ified client applications Client app contacts SOCKS server, authenticates, sends relay request Server evaluates & establishes relay connection UDP handled with parallel TCP control channel

Слайд 17
Описание слайда:
Firewall Basing Several options for locating firewall: Bastion host Individual host-based firewall Personal firewall

Слайд 18
Описание слайда:
Bastion Hosts Critical strongpoint in network Hosts application/circuit-level gateways Common characteristics: Runs secure O/S, only essential services May require user auth to access proxy or host There may be many proxy services Each proxy can restrict features, hosts accessed Each proxy small, simple, checked for security Each proxy is independent, can be uninstalled

Слайд 19
Описание слайда:
Host-Based Firewalls Used to secure individual host Available in/add-on for many O/S Filter packet flows Often used on servers Advantages: Tailored filter rules for specific host needs Protection from both internal/external attacks Additional layer of protection to org firewall when used with a standalone firewall

Слайд 20
Описание слайда:
Personal Firewall Controls traffic flow to/from PC/workstation For both home or corporate use May be software module on PC Or in home cable/DSL router/gateway Typically much less complex Primary role to deny unauthorized access May also monitor outgoing traffic to detect/block worm/malware activity

Слайд 21
Описание слайда:
Firewall Locations

Слайд 22
Описание слайда:
Virtual Private Networks

Слайд 23
Описание слайда:
Distributed Firewalls

Слайд 24
Описание слайда:
Firewall Topologies Host-resident firewall: personal firewall and firewall on servers (used alone or part of a defense in-depth) Screening router: a single router between internal and external networks, e.g., SOHO apps) Single bastion inline: single firewall device between an internal and external router (stateful or app proxies) Single bastion T: similar to above but has a 3rd NIC on bastion to a DMZ (for medium to large organizations) Double bastion inline: DMZ is between (for large organizations) Distributed firewall configuration

Слайд 25
Описание слайда:
Intrusion Prevention Systems (IPS) Recent addition to security products which Inline network-/host-based IDS that can block traffic Functional addition to firewall that adds IDS capabilities Using IDS algorithms but can block or reject packets like a firewall May be network or host based

Слайд 26
Описание слайда:
Host-Based IPS Identifies attacks using both: Signature techniques malicious application packets Anomaly detection techniques behavior patterns that indicate malware Example of malicious behavior: buffer overflow, access to email contacts, directory traversal Can be tailored to the specific platform e.g. general purpose, web/database server specific Can also sandbox applets to monitor behavior May give desktop file, registry, I/O protection

Слайд 27
Описание слайда:
Network-Based IPS inline NIDS that can discard packets or terminate TCP connections uses signature and anomaly detection may provide flow data protection monitoring full application flow content can identify malicious packets using: pattern matching (for specific byte seq) stateful matching (to stop attack streams rather than a single pkts) protocol anomaly (deviations from stds) traffic anomaly (unusual traffic like a UDP floods)

Слайд 28
Описание слайда:
Unified Threat Management Products

Слайд 29
Описание слайда:
Summary Introduced need for & purpose of firewalls Types of firewalls packet filter, stateful inspection, application and circuit gateways Firewall hosting, locations, topologies Intrusion prevention systems


Скачать презентацию на тему Computer Security: Principles and Practice. Firewalls and Intrusion Prevention Systems. Chapter 9 можно ниже:

Похожие презентации