1 / 19

Firewall in the Internet Security

Firewall in the Internet Security. By Dou Wang, Ying Chen, Jiaying Shi School of Computer Science University of Windsor November 2007. Outline. Introduction of Firewall Packet filtering Firewall policy management Firewall implementation Comments Conclusions. Introduction.

marijke
Download Presentation

Firewall in the Internet Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Firewall in the Internet Security By Dou Wang, Ying Chen, Jiaying Shi School of Computer Science University of Windsor November 2007

  2. Outline • Introduction of Firewall • Packet filtering • Firewall policy management • Firewall implementation • Comments • Conclusions

  3. Introduction • What is firewall? • Firewall is a collection of components interposed between two networks that filter traffic between them according to some security policy. [5] They are strategically placed between internal network and outside Internet network (e.g., the Internet service provider). It always appeared on the edge, which apart trusted networks from un-trusted networks. Introduction

  4. Introduction • What is firewall management? • Basically, the management program configured in two ways: default-deny and default-allow policy. The former approach is by far more secure in security but usually many networks will deploy the latter approach due to the difficulty in configuration and limitation of certain knowledge. Introduction

  5. Introduction • Firewalls can be divided into the following categories by working principle: • Packet filtering firewall, it has a list of firewall security rules which are able to block traffic based on IP protocol, IP address and IP port number. • Stateful firewall, it is more intelligent on keeping track of active connections. Because it employs state machines to maintain state associated with established protocol connections. • Deep packet inspection firewall, it will actually examine the data in the packet. • Application-aware firewall, which is similar to deep packet inspection firewall, and it understands certain protocols and could parse them, so that signatures or rules can be specially addressed in protocol. Introduction

  6. Introduction • Firewalls also can be divided into the following categories by usage: • Personal firewall, this generally refers to software runs on your workstation and acts as a packet filtering firewall. • Distributed firewall, its security policy is defined centrally but enforced at each individual network endpoint. Policy distribution can take various forms. • Layer 2 firewall (transparent bridge mode) allows to be inserted without disrupting operation of network. This feature let it easy deployment and mitigate an ongoing attack. Introduction

  7. Introduction • Additional services from firewall: • Network Address Translation • Split-horizon DNS • Mitigating Host Fingerprinting • Virtual Private Network • Damage Mitigation • Intrusion Prevention Systems (IPS) • Host-subnet Quarantining Introduction

  8. Packet filtering • In the paper: “Adaptive Statistical Optimization Techniques for Firewall Packet Filtering”, it discusses the packet filtering optimization in two aspects. • The first aspect they propose an approximation algorithm that analyzes firewall policy rules off-line and generates different near-optimal solutions and constructs a set of rules that can reject the maximum number of unwanted packets as early as possible. • The other aspect they propose using statistical search tree based on the matching-frequency of different field values in the policy, as calculated from the traffic. They present two tree structures: near-optimal cascade tree structure for single-threaded processing; parallel tree structure for network processor platforms.

  9. Packet filtering • First part discusses the early traffic rejection. • There are three algorithms comprise the main operations of the early rejection module. • In Algorithm 1, builds up of the candidate rejection rule list out of different solutions to the set cover problem takes place. [3] • Algorithm 2, periodically adds or moves rules according to the performance gain/loss of each rule. • Algorithm 3 shows the per-packet operation of filtering and shows the location of early rejection relative to normal packet filtering, • as well as the update of statistics required for early rejection.

  10. Packet filtering • Second part discusses the statistic optimization. • In statistical optimization part, the following steps involved: • A. Locality of matching properties in firewall filtering • B. Statistical matching tree • C. Matching tree construction using alphabetic trees • D. Policy matching algorithms using alphabetic trees • E. Tree reconstruction and updates

  11. Firewall policy deployment • The paper: “On the Safety and Efficiency of Firewall Policy Deployment” provides the first formal definition and theoretical analysis of safety in firewall policy deployment. • As ample research is focus on tools for policy specification, correctness analysis and optimization, few has on firewall policy deployment.

  12. Firewall policy deployment • A firewall controls traffic by examining the contents of network packets, which is why a firewall is also called a packet filtering device. Five packet fields are most commonly used for traffic filtering: protocol type, source IP address, source port, destination IP address, and destination port. • In every packet, each of the five fields assumes a specific • value, such as <TCP, 192.168.5.7, 1352, 10.1.1.1, 23>. Fields • other than those in the 5-tuple, e.g., IP TOS (Type • of Service) and TTL (Time to Live) values.

  13. Firewall policy deployment Table1: Results of Experiments of Firewall Policy Deployment [2]

  14. Write rules Repository Rules Validation Unit Interface Log Existing rules Parsed XML Request verdict Parsed XML Packet Queue Parser Valid SOAP Packet Payload SOAP packets Packet Forger Soap Filter Port 80 traffic Non-SOAP Packets Packet from Client Server IPTables Firewall implementation • The paper: “Nedgty: Web Services Firewall” introduce a open source web service firewall applying business specific rules in a centralized manner. • It also secure web services against denial of services, buffer overflow and XML denial of services attacks. SOAP Packet Set Verdict

  15. Comments • We noticed that there are still some limitations or drawbacks in their firewall systems: • The very first is those firewalls do very little, if anything, against the attack from the inside network. (e.g. there are attackers on the inside network, for example, a disgruntled employee) • The second is firewall found relatively difficult to handle some protocols as they involved multiple and seemingly independent packet flows. Take FTP for example, a control connection is initiated by client to server, while data connections are initiated by server to client. • The third is end-to-end encryption can be a threat to firewalls, because it prevents firewalls from looking at the packet fields, where filtering should be done.

  16. Comments • Solution of end-to-end encryption: • When encryption is used for confidentiality (often called Virtual Private Networks), there are two general cases: • Encryption is performed by the firewall, i.e. it is the endpoint of a VPN. The firewall could understand and filter the actual protocol used within the VPN and provide intelligent logging. • Encryption is performed by a host inside the firewall (End-to-End encryption). The VPN becomes a point of entry for an attacker that the Firewall administrator cannot detect. Therefore, the VPN end-point inside the firewall must be VERY well configured / monitored and use firewall mechanisms such as strong authentication.

  17. Conclusions • From the centralized, single threaded convention firewall to become distributed and multi-threaded much intelligent modern firewall, the safety and efficiency have been both enhanced by deployed different kinds of techniques. • From the first generation firewall focused on packet filtering and the second generation firewall on state, the third generation turned on application-aware, including intrusion prevention system that greatly enhance security functionality.

  18. Reference • [1] Bebawy, R.; Sabry, H.; El-Kassas, S.; Hanna, Y.; Youssef, Y.; “Nedgty: Web Services Firewall”, Web Services, 2005. ICWS 2005. Proceedings. 2005 IEEE International Conference on 11-15 July 2005 • [2] Zhang, Charles C.; Winslett, Marianne; Gunter, Carl A.; “On the Safety and Efficiency of Firewall Policy Deployment” Security and Privacy, 2007. SP '07. IEEE Symposium on 20-23 May 2007 Page(s):33 - 50 • [3] Hamed, H.; El-Atawy, A.; Al-Shaer, E.; “Adaptive Statistical Optimization Techniques for Firewall Packet Filtering”, 25th IEEE International Conference on Computer Communications. April 2006 Page(s):1 – 12 • [4] Introduction of Firewall security, http://www.secureworks.com/research/articles/firewall-security, 2007 • [5] C.Douligeris and D.N. Serpanos, “Network Security: Current Status and Future Directions”, 2007 the Institute of Electrical and Electronics Engineers, Inc. • [6] Firewall, http://en.wikipedia.org/wiki/Firewall, 2007 Reference

  19. ?

More Related