Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University References Security in Computing, 3rd Ed. Chapter 7 (pgs. 457-479) Section Overview Firewall Components Firewall Architectures Network Intrusion Systems Honeypots Internet Firewalls DMZ Internet Internal Network Firewall Benefits Host Service Protection Host Access Control Centralized Point of Security Enhanced Privacy Increased Audit Logging Policy Enforcement Implementation Issues Service Restrictions Allowed Service Vulnerabilities User Backdoors Insider Attacks Viruses Network Throughput to/from Internet Single Point of Failure Firewall Components Network Policy Advanced Authentication Packet Filtering Application Gateways Network Policy Service Access Policy Extension of Site Security Policy Which services are allowed to/from which hosts Who is authorized to change policy Firewall Design Policy How Service Access Policy is implemented Either… Permit any service unless it is expressly denied Deny any service unless it is expressly permitted Advanced Authentication Internet Unauthenticated Internal Network Authenticated Using one-time password techniques to allow access via certain services Packet Filtering Routers Allowing/Restricting access based on: IP Addresses (source/destination) Protocol (TCP/UDP/ICMP) TCP/UDP Ports (source/destination) ICMP Message Type Packet Size Router Interface/Direction Single and multiple addresses/ports per entry Screening Routers Packet Filtering Options Send the packet Reject the packet Drop the packet Log information about the packet Notify administrator (set off an alarm) Packet Filtering Weaknesses Hard to configure Hard to test More complex the rules, more performance might be impacted No Advanced Authentication support Application Gateways Service components allowed/denied based on rule set Each packet repackaged after examination Information hiding Robust authentication and logging Application GW Weaknesses Scalability Difficult to manage Connectionless Protocols Performance Each service requires it’s own proxy Each packet gets repackaged OS/Service Bugs Circuit Gateways Similar to Application Gateway No packet processing done at the gateway Stateful Multi-Layer Inspection Inspects raw packets Inspection engine intercepts packet at the OSI Network Layer Context Aware Creates a virtual state for connectionless protocols Source: Checkpoint Software Technologies Ltd. Firewall Architectures Single Device Screening Router Dual-Homed Host Multi-Device Screened Host Screened Subnet Split-Screened Subnet Screening Router Screening Router Internet Internal Network Dual-Homed Gateway Internet Internal Network Info Server Proxy Server Network Address Translation Not specifically for security (RFC 1918) Hides internal network configuration 1 to 1 allocation Static Dynamic IP Masquerading Many internal addresses using 1 external address Only internal hosts can initiate a connection Screened Host Internet Internet Server Screening Router Bastion Host Internal Network Screened Subnet Internet Internal Network Internet Server Screening Router Screening Router Bastion Host Split Screened Subnet Internet Internal Network Internet Server Dual-Homed Proxy Screening Router Screening Router Intranet Server Network Intrusion Detection Internal Network Internet Dual-Homed Proxy Screening Router Screening Router Analysis Station Sensors IDS Analysis Knowledge based (attack signatures) Port Scans Denial of Service Known Service Attacks Spoofing Content Behavioral based IDS Weaknesses Very young technology False Positives False Negatives Scalability Honeypots Sacrificial host used to lure attackers Simulates a vulnerable system Used to study attacker techniques Firewall/IDS traffic logs System logs File Integrity Checker logs Keystroke capturing Early Case – “Berferd”