Corporate Panel - Northwestern University Information Technology

advertisement
Security: “The four eyed monster”
Joel Sible
Security TM
Juniper Networks
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
1
Agenda
 Security landscape and its evolution
 Challenges for the user and Universities
• Methods of University firewalling
 Types of firewalls and their evolution
 Layer 7 attacks and the response for mitigation
 SSL VPNs: ubiquitous and secure access
 Juniper Security Solutions
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
2
Beneath The Surface…
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
3
All segments have real concern
• Service Providers
• Reliability, Bandwidth Piracy, Customer Data
• Security As a Differentiator
• Utilities
• Regulatory, Audit, SCADA Systems
• Financial Services
• GLB, Sarbanes-Oxley, Audit, SEC…
• Healthcare Related
• Privacy, Intellectual Property, Service continuity
• Federal, State & Local Government
• DHS Regs, HIPPA, Privacy, Hacktivism, Service continuity
• Universities
• Peer-to-Peer, RIAA
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
4
Vulnerabilities
Vulnerabilities Reported
Vulnerabilities Over Time
4500
4000
3500
3000
2500
2000
1500
1000
500
0
1995
CERT/CC - www.cert.org
Copyright © 2004 Juniper Networks, Inc.
1996
1997
1998
1999
2000
2001
2002
2003
Year
Proprietary and Confidential
www.juniper.net
5
Vulnerabilities this week alone!

2004-07-27: RiSearch/RiSearch Pro Open
Proxy Vulnerability 2004-07-27: phpMyFAQ
Image Manager Authentication Bypass
Vulnerability 2004-07-27: Opera Web Browser
Location Replace URI Obfuscation
Weakness 2004-07-26: Sun Solaris 'ypbind'
Unspecified Buffer Overflow
Vulnerability 2004-07-26: Zero G
InstallAnywhere Insecure Temporary File
Creation Vulnerability 2004-0726: OpenDocMan Access Control Bypass
Vulnerability 2004-07-26: Apple Mac OSX
Internet Connect Insecure Temporary File
Handling Symbolic Link Vulnerability 2004-0726: Subversion 'mod_authz_svn' Access
Control Bypass Vulnerabilities 2004-0726: Dropbear SSH Server Digital Signature
Standard Unspecified Authentication
Vulnerability 2004-07-26: Invision Power
Board Index.php Query String Cross-Site
Scripting Vulnerability 2004-07-26: MoinMoin
Unspecified Privilege Escalation
Vulnerability 2004-07-26: MoinMoin
PageEditor Unspecified Privilege Escalation
Vulnerability 2004-07-26: PostNuke Reviews
Module Cross-Site
Copyright © 2004 Juniper Networks, Inc.

2004-07-26: PHP Strip_Tags() Function
Bypass Vulnerability 2004-07-26: PHP
memory_limit Remote Code Execution
Vulnerability 2004-07-26: XLineSoft
ASPRunner Multiple Vulnerabilities 2004-0726: Nucleus CMS Action.PHP SQL Injection
Vulnerability 2004-07-26: EasyWeb
FileManager Module Directory Traversal
Vulnerability 2004-07-24: EasyIns Stadtportal
Site Parameter Remote File Include
Vulnerability 2004-07-24: eSeSIX Thintune
Thin Client Devices Multiple
Vulnerabilities 2004-07-24: Microsoft
Systems Management Server Remote Denial
Of Service Vulnerability 2004-0724: PostNuke Install Script Administrator
Password Disclosure Vulnerability 2004-0723: HP-UX SMTKFONT Remote Unauthorized
Access Vulnerability 2004-07-23: HP-UX XFS
Remote Unauthorized Access
Vulnerability 2004-07-23: Ethereal Multiple
Unspecified iSNS, SMB and SNMP Protocol
Dissector Vulnerabilities 2004-07-23: Apache
mod_userdir Module Information Disclosure
Vulnerability 2004-07-23: Computer
Associates Common Services Multiple Denial
Of Service Vulnerabilities 2004-0723: Nessus Insecure Temporary File Creation
Vulnerabiliry
Proprietary and Confidential
www.juniper.net
6
The Vulnerability & Threat Lifecycle
Before new vulnerability is known
New vulnerability discovered
Exploit developed
advisory
released to public
Worm released
Getting shorter
Getting shorter
time
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
7
Incidents (Realized Threats)
Incidents Over Time
160000
Incidents Reported
140000
120000
100000
80000
60000
40000
20000
0
1995 1996 1997 1998 1999 2000 2001 2002 2003
Year
CERT/CC - www.cert.org
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
8
Blended Threats / Worms




Slapper
Slammer
Code Red
Nimda
Copyright © 2004 Juniper Networks, Inc.




Blaster
Nachi / Welchia
Witty
Sasser
Proprietary and Confidential
www.juniper.net
9
Shareware tools
 Password crackers
 Keystroke loggers
 GUI driven exploit engines
 Publicly available exploit / vulnerability research
 Worm customization tools
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
10
Hacker fun….
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
11
Here’s what he saw on his screen…
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
12
More hacker fun….
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
13
Extortion
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
14
Manipulation of Stock Market
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
15
Today’s Security Challenges for Universities





Growing need to provide secure, scalable access to internal/external users
Increasing network vulnerabilities
No trusted network
Increasing application attacks
Need to securely run your business
Computer Labs
Students
Campus
ADMIN
Internet
Univ
Finance
Department
Servers
Schools
DMZ
Public
Data Center
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
16
Different Products, Different Levels of
Security
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Application Traffic
00000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000 000000000000000000000000000 000000000000
0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 00
00000000000000000000000000000000
00000000000000000000000000000000
0
00000000000000000000000000000000
000000000000000000000000000000000
Stateful Inspection
Firewall
Purpose
Attacks Protected
Limitations
Copyright © 2004 Juniper Networks, Inc.
Deny Some Attacks
Deny Traffic
IDS
Proxy Firewall
Protect network layer &
access control
Terminates all sessions
Compliance monitoring
DoS, Port scans, IP
Spoofing
Specific protocols
None
Application-level attacks get
in
Low performance, limited
protocols, HA
No attack protection, passive
Proprietary and Confidential
www.juniper.net
17
Need for Pervasive Network &
Application Attack Protection
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Application Traffic
00000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000 000000000000000000000000000 000000000000
0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 00
00000000000000000000000000000000
00000000000000000000000000000000
0
00000000000000000000000000000000
000000000000000000000000000000000
Detects
Attacks
Drops
Attacks
Deny Some Attacks
Deny Traffic
Pervasive Security Requirements
Intrusion Prevention
•
Firewall becomes application aware
 network and application-level
attack protection
•
Complement firewall
 2nd layer of defense to prevent
attacks
•
Operate as network device
 good performance, more
protocols, more attack coverage
•
Increase accuracy
 detect more attacks, reduce false
alarms
•
Enable analysis functions
 comprehensive logging
•
Simplify management
 rule-based, centralized control
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
18
Deep Inspection™ Firewall Delivers
Network and Application level protection …
Deep
Inspection
Protocol conformance
Application Attack
00000000000000000000000000000000
Application Traffic
Reassemble, normalize, eliminate ambiguity
Stateful
Inspection
00000000000000000000000000000000
00000000000000000000000000000000
00000000000000000000000000000000
Track sessions
Packets
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Application Traffic
00000000000000000000000000000 000000000000000000000000000 000000000000000000000000000000000000000
000000000000000000000000000000
00
000000000000000000000000000000
000
000000000000000000000000000
Copyright © 2004 Juniper Networks, Inc.
Deny Some Attacks
Deny Traffic
Proprietary and Confidential
www.juniper.net
19
Antivirus
 Detect attacks at the file level based on patterns
 AV deployed at desktop and mail servers
 Gateway deployment growing as additional layer
Remote Site
Central and Branch Offices
Third Layer
Gateway
Antivirus
Copyright © 2004 Juniper Networks, Inc.
Second Layer First Layer
File / Mail
Server
Antivirus
Desktop
Antivirus
Proprietary and Confidential
www.juniper.net
20
Enterprise Run VPN Solutions
Fixed-site
Site-to-site telecommuter
VPN
IPSec VPN
Intranet
Access
Whole
Enterprise Control
Traditional Remote
Remote
access
access
Extranet
access
SSL VPN
Secure Meeting
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
21
Juniper’s Layered Security
Solutions
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
22
Security Product Line
Integrated Firewall/IPSEC VPN Solutions
Appliances with various security options, interface,
power supply and performance configurations for
large/med enterprise and Service Providers
Secure Access SSL VPN Solutions
3 product lines for secure LAN, extranet and intranet
access to mobile employees, customers and partners
with no client software deployment or changes to LAN
infrastructure
Intrusion Detection and Prevention Solutions
4 products that help Intrusion prevention appliance
protects network, critical resources from attacks
through detection and prevention
Secure Meeting
Enables secure cross-enterprise online meetings and
application sharing
Central Policy-based Management Solution
3-tier system provide role-based administration and
central control and logging of all NS FW/VPN
solutions
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
23
Education & Research Customers
 Stanford University  Amherst
 Cornell University
 Brown University
 California State
 DePaul University
 University of
Buffalo
 Cambridge University
 Massachusetts Maritime
Academy
 Gallaudet
University
 Oxford University
 Cardiff University
 University of Miami  Osaka University
 Indiana University  Columbia University
 Johns Hopkins
University
 UCSF
Copyright © 2004 Juniper Networks, Inc.
 Tokyo University
 Japan Advanced Institute of
Science and Technology
 Michigan State University
 Oklahoma State University
 Oregon State
 UC Berkeley
 University of
Pittsburgh
 Tufts University
 Creighton University
Proprietary and Confidential
www.juniper.net
24
It’s All
About Risk
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
25
Managing Risk
Vulnerability
Threat
X
Risk =
Copyright © 2004 Juniper Networks, Inc.
Asset Value
X
$
________
Countermeasures
Proprietary and Confidential
www.juniper.net
26
Points to remember
 There is no “silver bullet”
 Exploitation is no longer the domain of the
specialist hacker
 People & their behavior is the weakest link
 Security policy outweighs point product
 Security is a revenue generation issue
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
27
Thank you
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
28
Download