Firewalls intrusion detection systems
Download
1 / 45

Firewalls & Intrusion Detection Systems - PowerPoint PPT Presentation


  • 174 Views
  • Updated On :

Firewalls & Intrusion Detection Systems . Communications, Networking & Computer Security Sanjay Goel University at Albany. Outline . Firewall Definition Types Configuration Lab Exercise (Kerio Personal Firewall) IDS Definition Operation Lab Exercises. Firewall What is a Firewall?.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Firewalls & Intrusion Detection Systems' - sai


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Firewalls intrusion detection systems l.jpg

Firewalls & Intrusion Detection Systems

Communications, Networking & Computer Security

Sanjay Goel

University at Albany


Slide2 l.jpg

Outline

  • Firewall

    • Definition

    • Types

    • Configuration

    • Lab Exercise (Kerio Personal Firewall)

  • IDS

    • Definition

    • Operation

    • Lab Exercises


Slide3 l.jpg

Firewall What is a Firewall?

  • A firewall is any device used to prevent outsiders from gaining access to your network.

  • Firewalls commonly implement exclusionary schemes or rules that sort out wanted and unwanted addresses.

    • They filter all traffic between a protected (“inside”) network and a less trustworthy (“outside”) network


Slide4 l.jpg

Firewall Composition?

  • Firewalls can be composed of software, hardware, or, most commonly, both.

    • The software components can be either proprietary, shareware, or freeware.

    • The hardware is typically any hardware that supports the firewall software.


Slide5 l.jpg

Firewall Design Goals

  • All traffic in both direction must pass through the firewall

  • Only authorized traffic should be allowed to pass

  • Firewall should itself be immune to penetration

    • Compromised firewall can completely undermine the network security

  • Tradeoff between security and productivity

    • Internal network could be completely secure, but employees may not be able to communicate


Slide6 l.jpg

Firewall Types

  • There are different kinds of firewalls, and each type has its advantages & disadvantages.

  • Firewalls can be classified in two broad categories

    • Network Level Firewalls

    • Personal Firewalls


Slide7 l.jpg

Firewall Network Level Firewalls

  • Network-level firewalls are usually router based.

    • The rules of who and what can access your network is applied at the router level.

  • This scheme is applied through a technique called packet filtering

  • Network Level Firewalls can be classified as

    • Packet-Filtering Gateways

      • The simplest and most effective type of firewalls

    • Stateful Inspection Firewalls

      • Maintain state info from a packet to another in the input stream

    • Application-Level Gateways (Proxies)

      • Proxy server, a relay of application-level traffic


Slide8 l.jpg

Firewall Packet Filtering

  • Packet Filtering is the process of examining the packets that come to the router from the outside world.

  • Packet headers are inspected by a firewall or router to make a decision to block the packet or allow access

  • Two Approaches:

    • Stateless (a.k.a. static)

    • Stateful


Slide9 l.jpg

Firewall Stateless Packet Filtering

  • Ignores the “state” of the connection

  • Each packet header is examined individually and compared to a “rule base”

    • Packet data is ignored

  • Common criteria to filter on:

    • Protocol Type

    • IP address

    • Port Number

    • Message Type


Slide10 l.jpg

Firewall Stateful Packet Filtering

  • Maintains a record of the state of the connection (referred to as state table)

  • Packet is compared against both rule base and state table

  • Some stateful filters can examine both packet header and content


Slide11 l.jpg

Firewall Application Gateway Firewall

  • When a remote user contacts a network running an application gateway, the gateway blocks the remote connection.

  • Instead of passing the connection along, the gateway examines various fields in the request.

  • If these meet a set of predefined rules, the gateway creates a bridge between the remote host and the internal host.


Slide12 l.jpg

Firewall Limitations

  • Firewalls are not complete solutions to all computer security problems, limitations:

    • The firewall cannot protect against attacks that bypass the firewall

    • The firewall does not protect against internal threats

    • The firewall cannot protect against the transfer of virus-infected programs or files


Slide13 l.jpg

Firewall Configuration Strategies

  • Screening Router

  • Simple

  • Filters traffic to internal computers

  • Provides minimal security

Source: Guide To Firewalls and Network Security


Slide14 l.jpg

Firewall Configuration Strategies

  • Screening Host

  • Host makes Internet request

  • Gateway receives client request and makes a request on behalf of the client

  • Host IP address never displayed to public

Source: Guide To Firewalls and Network Security


Slide15 l.jpg

Firewall Configuration Strategies

  • Two Routers, One Firewall

  • External router can perform initial static packet filtering

  • Internal router can perform stateful packet filtering

  • Multiple internal routers can direct traffic to different subnets

Source: Guide To Firewalls and Network Security


Slide16 l.jpg

Firewall Configuration Strategies

  • DMZ Screened Subnet

  • DMZ sits outside internal network but is connected to the firewall

  • Public can access servers residing in DMZ, but cannot connect to internal LAN

Source: Guide To Firewalls and Network Security


Slide17 l.jpg

Firewall Configuration Strategies

  • Two Firewalls, One DMZ

  • First firewall controls traffic between the Internet and DMZ

  • Second firewall controls traffic between the internal network and DMZ

  • Second firewall can also be a failover firewall


Slide18 l.jpg

Firewall Kerio Personal Firewall (KPF)

  • What’s KPF?

    A software agent builds a barrier between PC and the Internet, to protect PC against hacker attacks and data leaks.

  • Why KPF?

    • KPF is designed to protect PC against attacks from both the Internet, and other computers in the local network.

    • KPF controls all data flow in both directions – from the Internet to your computer and vice versa

    • KPF can block all attempted communication allowing only what you choose to permit.


Lab exercise configure kerio personal firewall l.jpg

Lab ExerciseConfigure Kerio Personal Firewall


Slide20 l.jpg

KPF How does it work?

Add text


Slide21 l.jpg

KPF Features

  • Blocks all externally originated IP traffic

  • Three security settings for easy configuration

  • MD5 signature verification protects the

    computer from Trojan horses

  • Protecting from Denial of Service (DOS) attacks to applications or services

  • Connections dialog clearly displays each application's activity at any given moment


Slide22 l.jpg

KPF Features Cont’d.

  • Availability (KPF version 4.1.3):

    • Available for trial for home use (limited free version) http://www.kerio.com/kpf_download.html

    • Manual is available at the following site http://download.kerio.com/dwn/kpf/kpf41-en-v3.pdf

    • Business and institutional customers are encouraged to download this software for evaluation purposes.

  • Platform:

    • For Windows 98, Me, NT, 2000 and XP

    • (Win 95 not available any more)


Slide23 l.jpg

KPF Installation

  • System requirements:

    • CPU Intel Pentium or 100% compatible

    • 64 MB RAM

    • 8 MB hard drive space (for installation only; at least 10 MB of additional space is recommended for logging)

  • Installation:

    • Executing the installation archive (kerio-pf-201-en-win.exe)

    • Choose the directory KPF be installed, or leave the default setting (C:\Program Files\Kerio\Personal Firewall)

    • Restart system after installation in order for the low-lever driver to be loaded


  • Slide24 l.jpg

    KPF Configuration

    • Overview — list of active and open ports, statistics, user preferences.

    • Network Security — rules for network communication of individual applications, Packet filtering, trusted area definitions

    • System Security — rules for startup of individual applications

    • Intrusions — configuration of parameters which will be used for detection of known intrusion types

    • Web - web content rules (URL filter, pop-ups blocking, control over sent data)

    • Logs & Alters -- logs viewing and settings


    Slide25 l.jpg

    The Firewall Engine takes care of all KPF functions

    It runs as a background application

    It is represented by an icon in the System Tray

    Right click the icon:

    Stop All Traffic

    Firewall Status

    Administration

    KPF Firewall Engine


    Slide26 l.jpg

    KPF Configuration Window


    Slide27 l.jpg

    KPF Administration

    Test


    Slide28 l.jpg

    KPF Status Window


    Slide29 l.jpg

    KPF Security Settings

    • Level of Security: (KPF allows 3 security levels)

      • Permit Unknown: minimum security

      • Ask Me First: all communication is denied implicitly at this level

      • Deny Unknown: all communication is denied which is not explicitly permitted by the existing filter rules


    Slide30 l.jpg

    KPF Security Settings Cont’d.

    • Test


    Slide31 l.jpg

    KPF Interaction with Users (Incoming)


    Slide32 l.jpg

    KPF Interaction with Users (Outgoing)


    Slide33 l.jpg

    KPF Packet Filtering Rules

    Comments


    Slide34 l.jpg

    KPF Application MD5 Signature


    Slide35 l.jpg

    KPF Filter.log File

    • The filter.log file is used for logging KPF actions on a local computer

    • Filter.log is a text file where each record is placed on a new line. It has the following format:

      • 1,[08/Jun/2001 16:52:09] Rule 'Internet Information Services': Blocked: In TCP, richard.kerio.cz [192.168.2.38:3772]->localhost:25, Owner: G:\WINNT\SYSTEM32\INETSRV\INETINFO.EXE

    • How to read this log file?



    Slide37 l.jpg

    IDSWhat Does it Do?

    • An intrusion detection system (IDS) monitors systems and analyzes network traffic to detect signs of intrusion.

    • An IDS can detect a variety of attacks in progress as well as well as attempts to scan a network for weaknesses.

    • An IDS can be a dedicated network appliance or a software solution installed on a host computer.

    • Two kinds of IDS Systems

      • Client Based (On a single node)

      • Network Based (Protecting the entire network)


    Slide38 l.jpg

    IDSHow does it work?

    • If configured correctly, a network intrusion detection system (NIDS) can monitor all traffic on a network segment.

    • A NIDS is most effective when used in conjunction with a firewall solution, and having all of its dependent components being properly connected and functioning.


    Slide39 l.jpg

    IDSConfiguration

    • NIDS can be installed on the external routers, the internal routers, or both.

    • Placing NIDS on external routers enables detection of attacks from the Internet

    • Placing NIDS on internal routers enables detection of internal hosts attempting to access the Internet on suspicious ports.


    Slide40 l.jpg

    IDSMethods of Detection

    • A NIDS/IDS mainly use anomaly or pattern detection to identify an intrusion or intrusion attempt.

    • An anomaly example: This involves monitoring resource use, network traffic, user behavior and comparing it against normal levels.

    • If a user that normally only accesses the system between 9 am – 5pm, suddenly logs on at 3 am then this may indicate that an intruder has compromised the user’s account. A NIDS/IDS would then alert administrators to this suspicious activity.

    • A NIDS/IDS can detect hacker attempts to scan your network for intelligence gathering purposes.


    Slide41 l.jpg

    IDSNetwork Packet Checking

    • Sits On Network location and “checks” packets that travel across the network.

    • If a packet contains a certain “footprint”, then it triggers an alert

    • Audit logs are generated and kept as records of alerts.


    Slide42 l.jpg

    IDSCommonly Used IDS Systems (Windows)

    • ISS Internet Security Systems (Black Ice Guardian)

      • Used by individuals and small business networks.

      • Looks for common algorithms concealed or “wrapped” in wrappers i.e. TCP Wrapper.

      • Can be configured as an IDS and a Firewall.

      • Can track unauthorized traffic and block the ports the intruding script/software is using.


    Slide43 l.jpg

    IDSVendor Firewalls & Versions (Hardware Based)

    • Axent: Raptor v6.5

    • Checkpoint: FW1 v4.1

    • Cisco: PIX v525

    • MS: Proxy v2.0


    Zone alarm pro l.jpg
    Zone Alarm Pro!

    View Demo


    Slide45 l.jpg

    Firewalls & IDSContributors

    • Edward Zhang

    • Michael LaBarge

    • Christopher Brown