CSIT560 Project Presentation Network Security Instructor: Mounir Hamdi Group Members Zhang Nan Cao Zhe Huang Qiankun Zhang Weiwei 06766498 06766723 06767040 06767296 zhangnan@ust.hk caozhe@ust.hk qkhuang@ust.hk jacko@ust.hk AGENDA Introduction Firewall Technology Intrusion Prevention System (IPS) Virtual Private Network (VPN) Wireless Network Security Issues Introduction Background 25% of respondents detected system penetration from the outside. 27% of respondents detected denial of service attacks. 79% detected employee abuse of Internet access privileges (for example, downloading pornography or pirated software, or inappropriate use of e-mail systems). 85% detected computer viruses 19% suffered unauthorized access or misuse within the last twelve months. 273 organizations that were able to quantify their losses reported a total of $265,589,940 …… (From The Computer Security Institute) Introduction Core Reason Lack of security design in TCP/IP model TCP/IP doesn’t verify the authenticity and validity of the source address before establish a connection. 3-way handshake in TCP/IP Introduction Distributed Denial of Service (DDoS) Attack Firewall What is Firewall? A firewall is a security device which is configured to permit, deny, or proxy data connections set and configured by the organization's security policy. Firewalls can either be hardware or software based. Firewall Firewall Architecture Packet Filter Firewall A packet filter firewall is a first-generation firewall technology that analyzes network traffic at the transport protocol layer. Each IP network packet is examined to see if it matches one of a set of rules defining what data flows are allowed. These rules identify whether communication is allowed based upon information contained within the Internet and transport layer headers and the direction in which the packet is headed (internal to external network or vice-versa). Firewall Firewall Architecture Circuit Level Firewall A circuit level firewall is a second-generation firewall technology. To validate a session, a circuit level firewall examines each connection setup to ensure that it follows a legitimate handshake for the transport layer protocol being used. In addition, data packets are not forwarded until the handshake is complete. The firewall maintains a table of valid connections and lets network packets containing data pass through when network packet information matches an entry in the virtual circuit table. Once a connection is terminated, its table entry is removed, and that virtual circuit between the two peer transport layers is closed. Firewall Firewall Architecture Application Layer Firewall An application layer firewall is a third-generation firewall technology that evaluates network packets for valid data at the application layer before allowing a connection. It examines the data in all network packets at the application layer and maintains complete connection state and sequencing information. In addition, an application layer firewall can validate other security items that only appear within the application layer data, such as user passwords and service requests. Firewall Firewall Architecture Dynamic Packet Filter Firewall A dynamic packet filter firewall is a fourth-generation firewall technology that allows modification of the security rule base on the fly. This type of technology is most useful for providing limited support for the UDP transport protocol. The UDP transport protocol is typically used for limited information requests and queries in application layer protocol exchanges. Firewall Cisco IOS Firewall Analysis Cisco IOS Firewall is a stateful security software component of Cisco IOS Software. Firewall integration in Cisco IOS routers augments a router's inherent capabilities: multi-topology interfaces, industry-standard routing protocols, and a broad range of services, as well as an expanding group of other security features such as VPN and IPS features. Cisco IOS Firewall interoperates with other Cisco IOS Software technologies, including NAT, QoS, and IPSec and SSL VPN, to become a vital component of an end-to-end network security infrastructure. Firewall Cisco IOS Firewall Analysis Configuration S0 192.168.1.1/24 Router 1 192.168.1.2/24 S0 S1 192.168.2.1/24 Router 2 192.168.2.2/24 S0 Router 3 Router_2(config)#access-list Router_1#ping 192.168.2.2 110 deny tcp any host 192.168.1.1 eq 23 Router_2(config)#access-list 110 permit ip any any Type escape sequence to Router_2(config)#int s1 about. Sending 5, 100-byte ICMP Router_2(config-if)#ip access-group Echos to 192.168.2.2, 110 out timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = Router_2(config-if)#exit 1/2/4 ms Router_2(config)# Router_1#telnet 192.168.2.2 Trying 192.168.2.2 ... % Destination unreachable; gateway or host down Firewall Limitations of Firewall Firewall cannot prevent attacks from internal networks. If a complainer from the internal network made an attack, since he’s dataflow didn’t go through firewall, the firewall could do nothing. Firewalls offer weak defense from viruses so antiviral software and an IDS/IPS which protects against Trojans and port scans should also complement our firewall in the layering defense. A firewall protection is limited once you have an allowable connection open. This is where another program should be in place to catch Trojan horse viruses trying to enter your computer as unassuming normal traffic. Intrusion Prevention System (IPS) Background Traditional security system: Fire wall designed to deny clearly suspicious traffic - such as an attempt to telnet to a device when corporate security policy forbids telnet access completely Intrusion detection systems (IDS) effective at detecting suspicious activity, but do not provide protection against attacks. Current Systems Firewall will allow some traffic through-web Intrusion detection systems Do not provide protection against attacks. Recent worms such as Slammer and Blaster have such fast propagation speeds that by the time an alert is generated, the damage is done and spreading fast. IPS Systems IPS systems are proactive defence mechanisms designed to detect malicious packets within normal network traffic (something that the current breed of firewalls do not actually do, for example) and stop intrusions dead, blocking the offending traffic automatically before it does any damage rather than simply raising an alert as, or after, the malicious payload has been delivered. Within the IPS market place, there are two main categories of product: Host IPS and Network IPS. Host IPS (HIPS) As with Host IDS systems, the Host IPS relies on agents installed directly on the system being protected. It binds closely with the operating system kernel and services, monitoring and intercepting system calls to the kernel or APIs in order to prevent attacks as well as log them. It may also monitor data streams and the environment specific to a particular application (file locations and Registry settings for a Web server, for example) in order to protect that application from generic attacks for which no “signature” yet exists. One potential disadvantage with this approach is that, given the necessarily tight integration with the host operating system, future OS upgrades could cause problems. Since a Host IPS agent intercepts all requests to the system it protects, it has certain prerequisites - it must be very reliable, must not negatively impact performance, and must not block legitimate traffic. Any HIPS that does not meet these minimum requirements should never be installed in a host, no matter how effectively it blocks attacks. Network IPS (NIPS) The Network IPS combines features of a standard IDS, an IPS and a firewall, and is sometimes known as an In-line IDS or Gateway IDS (GIDS). The next-generation firewall - the deep inspection firewall - also exhibits a similar feature set, though we do not believe that the deep inspection firewall is ready for mainstream deployment just yet. Network IPS (NIPS) As with a typical firewall, the NIPS has at least two network interfaces, one designated as internal and one as external. As packets appear at the either interface they are passed to the detection engine, at which point the IPS device functions much as any IDS would in determining whether or not the packet being examined poses a threat. Network IPS (NIPS) However, if it should detect a malicious packet, in addition to raising an alert, it will discard the packet and mark that flow as bad. As the remaining packets that make up that particular TCP session arrive at the IPS device, they are discarded immediately. Network IPS (NIPS) Challenges In-line device fails, however, it can seriously impact the performance of the network. Perhaps latency rises to unacceptable values, or perhaps the device fails closed, in which case you have a self-inflicted Denial of Service condition on your hands. Network IPS (NIPS) As an integral element of the network fabric, the Network IPS device must perform much like a network switch. It must meet stringent network performance and reliability requirements as a prerequisite to deployment, since very few customers are willing to sacrifice network performance and reliability for security. A NIPS that slows down traffic, stops good traffic, or crashes the network is of little use. Requirements of IPS System In-line operation Reliability and availability Resilience Low latency High performance Unquestionable detection accuracy Fine-grained granularity and control Advanced alert handling and forensic analysis capabilities - NSS IPS Test The NSS Group has conducted the first comprehensive IPS test of its kind. This exhaustive review will give readers a complete perspective of the capabilities, maturity and suitability of the products tested for their particular needs. If a particular IPS has been designated as NSS Approved, customers can be confident that the device will not significantly impact network/host performance, cause network/host crashes, or otherwise block legitimate traffic. Example CISCO IOS IPS Cisco IOS IPS uses the underlying routing infrastructure to provide an additional layer of security with investment protection. Because Cisco IOS IPS is inline and supported on a broad range of routing platforms, attacks can be effectively mitigated to deny malicious traffic from both inside and outside the network. When used in combination with Cisco IOS Firewall, VPN, and Network Admission Control (NAC) solutions, Cisco IOS IPS provides superior threat protection at all entry points into the network. Cisco IOS IPS is supported by easy and effective management tools, reducing operational complexity and expenditure (refer to Cisco Router and Security Device Manager and CiscoWorks VPN/Security Management Solution). Whether threats are targeted at endpoints, servers, or the network infrastructure, Cisco Systems® offers pervasive intrusion prevention solutions that are designed to integrate smoothly into the network infrastructure and proactively protect vital resources. Example CISCO IOS IPS Cisco IOS IPS has two main deployment scenarios: Cisco IOS IPS protecting the Internet-facing (untrusted) interface Cisco IOS IPS within the internal (trusted) network Cisco Deployment Scenario Cisco Deployment Scenario (1) Cisco IOS IPS Protecting the InternetFacing (Untrusted) Interface Cisco recommends enabling Cisco IOS IPS on the Internet traffic to protect the network from attacks and exploits that might come into the branch office or telecommuter personal computers, which could in turn affect the corporate network. GENERAL CISCO IOS IPS STRUCTURE Cisco IOS IPS uses technology from Cisco Intrusion Detection System (IDS) and IPS sensor product lines, including Cisco IDS 4200 Series Sensors, Cisco Catalyst® 6500 Series IDS Services Modules, and network module hardware IDS appliances. Cisco IOS IPS relies on signature microengines (SMEs) to support IPS signatures. Each engine categorizes a group of signatures, and each signature detects patterns of misuse in network traffic. Virtual Private Network (VPN) Introduction to VPN Virtual private network (VPN) is a cost effective and secure way for different corporations to provide user access to the corporate network and for remote networks to communicate with each other across the Internet. Usually VPN involves two parts: the protected or "inside" network, which provides physical and administrative security to protect the transmission; and a less trustworthy, "outside" network. Between them, there’s usually a firewall. Applications for VPN VPN Architecture Remote-access VPNs allow one remote system to connect to a network. The dashed-blue data flow implies access to the entire corporate LAN. In practice, a remote-access VPN tunnel can limit that access through access control lists (ACLs) or firewall rules. VPN Architecture A point-to-point VPN connects two networks. An encrypted point-topoint connection between two different networks are created over some untrusted medium. Routers, firewalls and dedicated VPN concentrators or servers,can be used as VPN endpoints. Technical Features Encryption Key Generation and management Certification Tunneling Interoperability Encryption Starting point of VPN solution Well-established encryption algorithms and strong encryption keys can make VPN much more effective. Key Generation and management Key length: In general, the longer the key, the tougher to break. Today, a key length of less than 56 bits is considered insecure. Key exchange: should be based on well-established algorithms (e.g. Diffie–Hellman for encryption and RSA for signature) as specified in strong key management standards. Key Generation and management Rate of key exchange: The more frequently a key is automatically exchanged, the more secure the encrypted data is. Key generation: The use of true random keys ensures the highest levels of security. The best method of key generation is using hardware. Certification Certification is the registration and identification of VPN components. It requires establishing well-defined secrets between a centrally controlled Certification Authority and any VPN device. Tunneling Tunneling is the encapsulation and encryption of entire transmitted packets. An effective tunneling mechanism hides the networking data in addition to the application and payload layers. A VPN solution which only encrypts the payload is not sufficiently secure, as a multitude of information is obtained by analyzing networking parameters. Interoperability The emerging Internet Protocol Security (IPSec) standard is becoming the international standard for VPN. IPSec has created a secure means for interoperable security, which guarantees that encrypted information is protected on its way from one network to another, while also allowing partner companies to link their respective VPNs together, even if their encryption systems were manufactured by different vendors. Wireless Network Security Issues Introduction The use of wireless networks is increasingly popular among personal, academic, business, and government users. With the increasing deployment of wireless networks (802.11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. What is 802.11? Wireless Local Area Network (WLAN) Protocol Defines Ethernet-like communication channel using radios instead of wires Advantages over other standards - longer ranges, higher speeds, simpler configurations IEEE 802.11 (WLAN) Wired vs. Wireless Wired networks offer more and better security options than wireless More thoroughly established standards with wired networks Wireless networks are much more equipment dependent than wired networks Easier to implement security policies on wired networks Wireless Vs Wired What is WEP WEP encodes your data using an encryption "key" before sending it out into the air. Any receiving unit must know the same key to decrypt the data. Keys can be 64- or 128bits long. The longer the key, the stronger the encryption. Keys are entered as strings of 10 or 26 hexadecimal digits. A "Pass phrase" feature is an easy-tore member word or phrase is entered, and an algorithm generates the hexadecimal keys for you. Is WEP Safe? Weaknesses in Wired Equivalent Privacy (WEP), the original native security mechanism for wireless local area networks (WLANs) in the Institute of Electrical and Electronics Engineers (IEEE) 802.11 specification. With WEP enabled, an intruder equipped with the proper tools and a moderate amount of technical knowledge could gain unauthorized access to the wireless network via the WLAN. Enterprises found it necessary to supplement WEP with third-party security solutions such as VPN, IEEE 802.1X authentication services servers, or add-on proprietary technologies. What is WPA Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks. WPA replaces WEP with a strong new encryption technology called Temporal Key Integrity Protocol (TKIP) with Message Integrity Check (MIC). It also provides a scheme of mutual authentication using either IEEE 802.1X/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK) technology. The Wi-Fi Alliance created WPA to enable introduction of standard-based secure wireless network products prior to the IEEE 802.11i group finishing its work. What is WPA The Encrypted Key for WEP is a static sequence, meaning it never changes. This means that if someone else figured the Key out, they too would be able to access the network. To further strengthen wireless security, WPA was developed which uses a Dynamic Key. These keys constantly change to keep hackers out! What is TKIP The Temporal Key Integrity Protocol, is part of the IEEE 802.11i encryption standard for wireless LANs,which is used to secure 802.11 wireless LANs. Provides per- packet key (dynamic) mixing, a message integrity check and a re- keying mechanism, thus fixing the flaws of WEP. Increases size of key from 40 to 128-bits Replaces WEP’s single static key with keys that are dynamically generated and distributed by the authentication server Extra step of entering user name/password (in addition to WEP) WPA and WPA2 Mode Types How to authenticate WPA-Enterprise and WPA2-Enterprise mutual authentication is initiated when a user associates with an access point. The AP blocks access to the network until the user can be authenticated. The user provides credentials which are communicated to the authentication server. The authentication process is enabled by the IEEE 802.1X/EAP framework. Mutual authentication helps to ensure that only authorized users access the network and confirms that the client is authenticating to an authorized server. It helps to protect users from accidentally connecting to unauthorized ‘rogue’ APs. WPA2 WPA2 offers advanced protection from wireless network attacks. Using AES, government grade encryption and IEEE 802.1X/EAP authentication WPA2 provides stronger standards-based mutual authentication and advanced encryption to protect the Wi-Fi network from a variety of threats and attacks. What is AES AES is a block cipher, a type of symmetric key cipher that uses groups of bits of a fixed length - called blocks. A symmetric key cipher is a cipher that uses the same key for both encryption and decryption. The word cipher is used in cryptography to describe the instructions or algorithm used for encrypting and decrypting information. With AES, bits are encrypted in blocks of plaintext that are calculated independently, rather than a key stream acting across a plaintext data input stream. AES has a block size of 128 bits with 3 possible key lengths 128, 192 and 256 bits as specified in the AES standard. Conclusion One single technology cannot secure the whole network environment. What we need is coordination. (Firewall, IPS, VPN…) The security policy is the core of the security system. The policy must be carefully designed, and once it has been implemented, all people in the organization must obey, or else the security is just a blank of paper. In the long run, an entirely new structure of the Internet must be implemented instead of TCP/IP. We imagine that a new structure with fine security protection design will come out soon.