Network security refers to the practices, policies, and technologies used to protect computer networks from unauthorized access, misuse, data breaches, and attacks. It is essential for maintaining the confidentiality, integrity, and availability of data and services that networks provide. Network se...
Network security refers to the practices, policies, and technologies used to protect computer networks from unauthorized access, misuse, data breaches, and attacks. It is essential for maintaining the confidentiality, integrity, and availability of data and services that networks provide. Network security is particularly crucial for organizations that handle sensitive or critical information, such as financial institutions, healthcare providers, and government agencies.
Size: 4.17 MB
Language: en
Added: Mar 06, 2025
Slides: 49 pages
Slide Content
Network security tools and devices Slide 1
Contd.. Slide 2 Network security tools and devices play a crucial role in safeguarding computer networks from unauthorized access, data breaches, and other security threats. These tools and devices are designed to: M onitor , D etect , P revent , and R espond to various types of network attacks and vulnerabilities.
Firewall Slide 3 Firewalls are one of the fundamental network security devices. They act as a barrier between internal networks and external networks, such as the Internet . Active content filtering technologies Firewalls examine incoming and outgoing network traffic based on predefined security rules and policies. They can block malicious traffic, unauthorized access attempts, and prevent certain types of attacks, such as distributed denial-of-service ( DDoS ) attacks . Firewalls operate on number of layers
8: Network Security 8- 4 Firewalls isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others . Is a Mecha n ism which filter out unwanted access attempts. firewall administered network public Internet firewall
F I R E W A L L Objectives : Protect local Systems Protect secured and controlled access to the Internet Provide restricted and controlled access from the Internet to the local servers Design Goals: All traffic flowing from inside to outside and vice versa should flow through the firewall Only authorized traffic will be allowed to pass through the firewall. The firewall itself is immune to penetration. Slide 5
8: Network Security 8- 6 Firewalls: Why prevent denial of service attacks: SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections. prevent illegal modification/access of internal data. e.g., attacker replaces CIA’s homepage with something else allow only authorized access to inside network (set of authenticated users/hosts )
T YPES OF F IREWALL Packet filters Work at the network level of the OSI model Each packet is compared to a set of criteria before it is forwarded . Checks Packet header Use IP address and Port Combination to setup rules ( to allow or not allow) Can use normal Packet Filtering Routers—Just manipulate the routing table. Attacks that can be made on packet filtering routers . IP Address Spoofing ( Because there is lack of authentication) Source Routing Attacks Tiny fragment attacks Slide 7
Firewalls – Packet Filters
Packet Filtering
T YPES OF F IREWALL Packet filtering firewall maintains a filtering table that decides whether the packet will be forwarded or discarded. Slide 10 Incoming packets from network 192.168.21.0 are blocked. Incoming packets destined for the internal TELNET server (port 23) are blocked. Incoming packets destined for host 192.168.21.3 are blocked. All well-known services to the network 192.168.21.0 are allowed.
Firewalls - Circuit Level Gateway
T YPES OF F IREWALL Circuit-level gateways Circuit level gateways work at the session layer of the OSI model, or the TCP layer of TCP/IP. Monitor TCP handshaking between packets to determine whether a requested session is legitimate . Unlike other types of firewalls that inspect individual packets or application-layer data, circuit-level gateways focus on the establishment and management of network connections. Slide 12
Circuit Level
T YPES OF F IREWALL Application-level Firewalls/gateways ( Proxy Server) can inspect and filter the packets on any OSI layer, up to the application layer. It has the ability to block specific content, also recognize when certain application and protocols (like HTTP, FTP) are being misused. Service specific ( http, e-mail content,…) Higher security than packet filters Easy to log and audit all incoming traffic Slide 14
Application Level
P ROXY S ERVER CAN FILTER OUT WEB PAGES OR OTHER CONTENTS Slide 16
T YPES OF F IREWALL Stateful Packet Inspection Firewall Stateful inspection firewalls combine packet filtering with session tracking capabilities. They keep track of the state of network connections and allow or block packets based on the context of the entire session. Stateful firewalls can verify that incoming packets belong to an established session and enforce more granular access control based on the state of the connection. Such a Firewall uses a packet’s TCP flag and sequence/ ack numbers to determine whether it is part of an existing, authorized flow It participate in establishment of an authorized connection If it is part of an existing connection, the packet is permitted, else dropped Slide 17
Demilitarized Zone (DMZ) Is a network architecture concept that provides a secure, isolated area between an organization's internal trusted network and an untrusted external network, typically the Internet. A separate network that sits outside the secure network perimeter. Outside users can access the DMZ but cannot enter the secure network. The purpose of a DMZ is to create a buffer zone that segregates publicly accessible services from internal resources, enhancing network security and reducing the risk of unauthorized access to sensitive data.
DMZ N ETWORKS S li de 19
DMZ with One Firewall
DMZ with Two Firewalls
Intrusion D etection Sy stem It is better to prevent attack than to detect it after it succeeds Unfortunately, not all attacks can be prevented Some attackers become intruders — succeed in breaking defenses Intrusion prevention — first line of defense Intrusion d etection — second line of defense Intrusion d etection system ( IDS ) - a device (typically a seprate computer) monitoring system activities to detect malicious / suspicious events IDSs attempt to detect Outsiders breaking into a system OR Insiders ( legitimate user s) attempting illegitimate actions Accidentally OR deliberately
I NTRUSION D ETECTION S YSTEMS Intrusion Detection – A Commercial Network Solution An “Intelligent Firewall” – monitors accesses for suspicious activity Could detect Trojan Horse attack, but not designed for Spyware Put the IDS in front of the firewall to get maximum detection In a switched network, put IDS on a mirrored port to get all traffic. Ensure all network traffic passes through the IDS host. PC Ser ver Internet Ser ver IDS Firewall Swi tch SNORT - open source network intrusion detection system
IDS AT V ARIOUS L EVELS Slide 24
25 Private Network Private IP network is an IP network that is not directly connected to the Internet IP addresses in a private network can be assigned arbitrarily. Not registered and not guaranteed to be globally unique NAT allows multiple devices within a private network to share a single public IP address when communicating with devices on the Internet. Generally , private networks use addresses from the following experimental address ranges ( non-routable addresses ): 10.0.0.0 – 10.255.255.255 172.16.0.0 – 172.31.255.255 192.168.0.0 – 192.168.255.255
26 Private Addresses
27 Network Address Translation (NAT) NAT is a router function where IP addresses (and possibly port numbers) of IP datagrams are replaced at the boundary of a private network NAT is a method that enables hosts on private networks to communicate with hosts on the Internet NAT is run on routers that connect private networks to the public Internet, to replace the IP address-port pair of an IP packet with another IP address-port pair.
28 Basic operation of NAT NAT device has address translation table
29 NAPT Network address and port translation (NAPT), port address translation (PAT). is an extension of Network Address Translation (NAT) that allows multiple devices within a private network to share a single public IP address by utilizing unique port numbers for translation. Scenario: Single public IP address is mapped to multiple hosts in a private network. NAT solution: Assign private addresses to the hosts of the corporate network NAT device modifies the port numbers for outgoing traffic
30 NAPT
31 Load balancing of servers Scenario: Balance the load on a set of identical servers, which are accessible from a single IP address NAT solution: Here, the servers are assigned private addresses NAT device acts as a proxy for requests to the server from the public network The NAT device changes the destination IP address of arriving packets to one of the private addresses for a server A sensible strategy for balancing the load of the servers is to assign the addresses of the servers in a round-robin fashion.
32 Load balancing of servers
33 Concerns about NAT Performance: Modifying the IP header by changing the IP address requires that NAT boxes recalculate the IP header checksum Modifying port number requires that NAT boxes recalculate TCP checksum Fragmentation Care must be taken that a datagram that is fragmented before it reaches the NAT device, is not assigned a different IP address or different port numbers for each of the fragments.
34 Concerns about NAT End-to-end connectivity: NAT destroys universal end-to-end reachability of hosts on the Internet. A host in the public Internet often cannot initiate communication to a host in a private network. The problem is worse, when two hosts that are in a private network need to communicate with each other.
35 Concerns about NAT IP address in application data: Applications that carry IP addresses in the payload of the application data generally do not work across a private-public network boundary. Some NAT devices inspect the payload of widely used application layer protocols and, if an IP address is detected in the application-layer header or the application payload, translate the address according to the address translation table.
36 NAT and FTP Normal FTP operation
37 NAT and FTP NAT device with FTP support
Impact of network architecture on security Security principles for good analysis, design, implementation, and maintenance apply to networks Architecture can improve security by: Segmentation Redundancy Single points of failure
Segmentation Architecture should use segmentation to limit scope of damage caused by network penetration by: Reducing number of threats Limiting amount of damage caused by single exploit Enforces least privilege and encapsulation component segmentation Placing different components of e-commerce system on different hosts Esp. put on separate host most vulnerable system components E.g., separate host for web server (w/ public access) Exploit of one host does not disable entire system
2 ) Redundancy Architecture should use redundancy to prevent losing availability due to exploit/failure of a single network entity Example : having a redundant web server ( WS ) in a company Types of redundancy include: Cold spare – e.g., when WS fails, replace it manually with spare WS Warm spare – e.g., failover mode = redundant WSs periodically check each other Hot spare – e.g., 3 WSs configured to perform majority voting
3) Single points of failure ( SPF ) Architecture should eliminate SPFs to prevent losing availability due to exploit/failure of a single network entity Using redundancy is a special case of avoiding SPFs Network designers must analyze network to eliminate all SPFs Example of avoiding SPF ( without using redundancy) Distribute 20 pieces of database on 20 different hosts (so called partitioned database ) Even if one host fails, 95% of database contents (19/20=95%) still available Elimination of SPFs (whether using redundancy or not) adds cost
DID , MLS Many security architecture and concepts are based on OSI 7 layers model DiD (Defense- in- Depth) MLS (Multi-layered Security) DiD model by CISCO Slide 42
… D I D, MLS DiD model by Microsoft The layers of defensive positions in defense in depth are as follows: Data: An attacker’s ultimate target, including your databases, Active Directory service information, documents, and so on. Application: The software that manipulates the data that is the ultimate target of attack. Host: The computers that are running the applications. Internal Network: The network in the corporate IT infrastructure. Perimeter: The network that connects the corporate IT infrastructure to another network, such as to external users, partners, or the Internet. Physical: The tangible aspects in computing: the server computers, hard disks, network switches, power, and so on. Policies, Procedures, Awareness: The overall governing principles of the security strategy of any organization. Without this layer, the entire strategy fails. Slide 43
… D I D , MLS There are *lots of* MLS model by vendors Usually, MLS model by vendor gives security product (safeguard) or service oriented view. Slide 44
Then , which layers are related to network security? Data encryption (new encryption/decryption algorithm) Forensics , anti- Forensics Gigantic Log analysis - Data mining Data layer Database access control and encryption Web application firewall – SQL injection, XSS Software testing - Fuzzying Reverse engineering Database/Application layer Host based IDS, IPS – anomaly detection Anti- virus – behavioral based OS/Platform layer IDS, IPS – misuse detection , anomaly detection Malicious code and Spam mail filtering Network layer Physical security – biometrics Pattern recognition – face, fingerprint, iris, Physical layer Slide 45 shape, hostile object
Security architecture Slide 46 3 major processes of information security Protection Detection Reaction Triangle of information security Confidentiality Integrity Availability Then, what to protect? Asset