Chapter_1_Introduction to Network Security-1.pptx

mmmmoh35 11 views 49 slides Mar 06, 2025
Slide 1
Slide 1 of 49
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49

About This Presentation

Network security refers to the practices, policies, and technologies used to protect computer networks from unauthorized access, misuse, data breaches, and attacks. It is essential for maintaining the confidentiality, integrity, and availability of data and services that networks provide. Network se...


Slide Content

Network security tools and devices Slide 1

Contd.. Slide 2 Network security tools and devices play a crucial role in safeguarding computer networks from unauthorized access, data breaches, and other security threats. These tools and devices are designed to: M onitor , D etect , P revent , and R espond to various types of network attacks and vulnerabilities.

Firewall Slide 3 Firewalls are one of the fundamental network security devices. They act as a barrier between internal networks and external networks, such as the Internet . Active content filtering technologies Firewalls examine incoming and outgoing network traffic based on predefined security rules and policies. They can block malicious traffic, unauthorized access attempts, and prevent certain types of attacks, such as distributed denial-of-service ( DDoS ) attacks . Firewalls operate on number of layers

8: Network Security 8- 4 Firewalls isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others . Is a Mecha n ism which filter out unwanted access attempts. firewall administered network public Internet firewall

F I R E W A L L Objectives : Protect local Systems Protect secured and controlled access to the Internet Provide restricted and controlled access from the Internet to the local servers Design Goals: All traffic flowing from inside to outside and vice versa should flow through the firewall Only authorized traffic will be allowed to pass through the firewall. The firewall itself is immune to penetration. Slide 5

8: Network Security 8- 6 Firewalls: Why prevent denial of service attacks: SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections. prevent illegal modification/access of internal data. e.g., attacker replaces CIA’s homepage with something else allow only authorized access to inside network (set of authenticated users/hosts )

T YPES OF F IREWALL Packet filters Work at the network level of the OSI model Each packet is compared to a set of criteria before it is forwarded . Checks Packet header Use IP address and Port Combination to setup rules ( to allow or not allow) Can use normal Packet Filtering Routers—Just manipulate the routing table. Attacks that can be made on packet filtering routers . IP Address Spoofing ( Because there is lack of authentication) Source Routing Attacks Tiny fragment attacks Slide 7

Firewalls – Packet Filters

Packet Filtering

T YPES OF F IREWALL Packet filtering firewall maintains a filtering table that decides whether the packet will be forwarded or discarded.  Slide 10 Incoming packets from network 192.168.21.0 are blocked. Incoming packets destined for the internal TELNET server (port 23) are blocked. Incoming packets destined for host 192.168.21.3 are blocked. All well-known services to the network 192.168.21.0 are allowed.

Firewalls - Circuit Level Gateway

T YPES OF F IREWALL Circuit-level gateways Circuit level gateways work at the session layer of the OSI model, or the TCP layer of TCP/IP. Monitor TCP handshaking between packets to determine whether a requested session is legitimate . Unlike other types of firewalls that inspect individual packets or application-layer data, circuit-level gateways focus on the establishment and management of network connections. Slide 12

Circuit Level

T YPES OF F IREWALL Application-level Firewalls/gateways ( Proxy Server) can inspect and filter the packets on any OSI layer, up to the application layer. It has the ability to block specific content, also recognize when certain application and protocols (like HTTP, FTP) are being misused. Service specific ( http, e-mail content,…) Higher security than packet filters Easy to log and audit all incoming traffic Slide 14

Application Level

P ROXY S ERVER CAN FILTER OUT WEB PAGES OR OTHER CONTENTS Slide 16

T YPES OF F IREWALL Stateful Packet Inspection Firewall Stateful inspection firewalls combine packet filtering with session tracking capabilities. They keep track of the state of network connections and allow or block packets based on the context of the entire session. Stateful firewalls can verify that incoming packets belong to an established session and enforce more granular access control based on the state of the connection. Such a Firewall uses a packet’s TCP flag and sequence/ ack numbers to determine whether it is part of an existing, authorized flow It participate in establishment of an authorized connection If it is part of an existing connection, the packet is permitted, else dropped Slide 17

Demilitarized Zone (DMZ) Is a network architecture concept that provides a secure, isolated area between an organization's internal trusted network and an untrusted external network, typically the Internet. A separate network that sits outside the secure network perimeter. Outside users can access the DMZ but cannot enter the secure network. The purpose of a DMZ is to create a buffer zone that segregates publicly accessible services from internal resources, enhancing network security and reducing the risk of unauthorized access to sensitive data.

DMZ N ETWORKS S li de 19

DMZ with One Firewall

DMZ with Two Firewalls

Intrusion D etection Sy stem It is better to prevent attack than to detect it after it succeeds Unfortunately, not all attacks can be prevented Some attackers become intruders — succeed in breaking defenses Intrusion prevention — first line of defense Intrusion d etection — second line of defense Intrusion d etection system ( IDS ) - a device (typically a seprate computer) monitoring system activities to detect malicious / suspicious events IDSs attempt to detect Outsiders breaking into a system OR Insiders ( legitimate user s) attempting illegitimate actions Accidentally OR deliberately

I NTRUSION D ETECTION S YSTEMS Intrusion Detection – A Commercial Network Solution An “Intelligent Firewall” – monitors accesses for suspicious activity Could detect Trojan Horse attack, but not designed for Spyware Put the IDS in front of the firewall to get maximum detection In a switched network, put IDS on a mirrored port to get all traffic. Ensure all network traffic passes through the IDS host. PC Ser ver Internet Ser ver IDS Firewall Swi tch SNORT - open source network intrusion detection system

IDS AT V ARIOUS L EVELS Slide 24

25 Private Network Private IP network is an IP network that is not directly connected to the Internet IP addresses in a private network can be assigned arbitrarily. Not registered and not guaranteed to be globally unique NAT allows multiple devices within a private network to share a single public IP address when communicating with devices on the Internet. Generally , private networks use addresses from the following experimental address ranges ( non-routable addresses ): 10.0.0.0 – 10.255.255.255 172.16.0.0 – 172.31.255.255 192.168.0.0 – 192.168.255.255

26 Private Addresses

27 Network Address Translation (NAT) NAT is a router function where IP addresses (and possibly port numbers) of IP datagrams are replaced at the boundary of a private network NAT is a method that enables hosts on private networks to communicate with hosts on the Internet NAT is run on routers that connect private networks to the public Internet, to replace the IP address-port pair of an IP packet with another IP address-port pair.

28 Basic operation of NAT NAT device has address translation table

29 NAPT Network address and port translation (NAPT), port address translation (PAT). is an extension of Network Address Translation (NAT) that allows multiple devices within a private network to share a single public IP address by utilizing unique port numbers for translation. Scenario: Single public IP address is mapped to multiple hosts in a private network. NAT solution: Assign private addresses to the hosts of the corporate network NAT device modifies the port numbers for outgoing traffic

30 NAPT

31 Load balancing of servers Scenario: Balance the load on a set of identical servers, which are accessible from a single IP address NAT solution: Here, the servers are assigned private addresses NAT device acts as a proxy for requests to the server from the public network The NAT device changes the destination IP address of arriving packets to one of the private addresses for a server A sensible strategy for balancing the load of the servers is to assign the addresses of the servers in a round-robin fashion.

32 Load balancing of servers

33 Concerns about NAT Performance: Modifying the IP header by changing the IP address requires that NAT boxes recalculate the IP header checksum Modifying port number requires that NAT boxes recalculate TCP checksum Fragmentation Care must be taken that a datagram that is fragmented before it reaches the NAT device, is not assigned a different IP address or different port numbers for each of the fragments.

34 Concerns about NAT End-to-end connectivity: NAT destroys universal end-to-end reachability of hosts on the Internet. A host in the public Internet often cannot initiate communication to a host in a private network. The problem is worse, when two hosts that are in a private network need to communicate with each other.

35 Concerns about NAT IP address in application data: Applications that carry IP addresses in the payload of the application data generally do not work across a private-public network boundary. Some NAT devices inspect the payload of widely used application layer protocols and, if an IP address is detected in the application-layer header or the application payload, translate the address according to the address translation table.

36 NAT and FTP Normal FTP operation

37 NAT and FTP NAT device with FTP support

Impact of network architecture on security Security principles for good analysis, design, implementation, and maintenance apply to networks Architecture can improve security by: Segmentation Redundancy Single points of failure

Segmentation Architecture should use segmentation to limit scope of damage caused by network penetration by: Reducing number of threats Limiting amount of damage caused by single exploit Enforces least privilege and encapsulation component segmentation Placing different components of e-commerce system on different hosts Esp. put on separate host most vulnerable system components E.g., separate host for web server (w/ public access) Exploit of one host does not disable entire system

2 ) Redundancy Architecture should use redundancy to prevent losing availability due to exploit/failure of a single network entity Example : having a redundant web server ( WS ) in a company Types of redundancy include: Cold spare – e.g., when WS fails, replace it manually with spare WS Warm spare – e.g., failover mode = redundant WSs periodically check each other Hot spare – e.g., 3 WSs configured to perform majority voting

3) Single points of failure ( SPF ) Architecture should eliminate SPFs to prevent losing availability due to exploit/failure of a single network entity Using redundancy is a special case of avoiding SPFs Network designers must analyze network to eliminate all SPFs Example of avoiding SPF ( without using redundancy) Distribute 20 pieces of database on 20 different hosts (so called partitioned database ) Even if one host fails, 95% of database contents (19/20=95%) still available Elimination of SPFs (whether using redundancy or not) adds cost

DID , MLS Many security architecture and concepts are based on OSI 7 layers model DiD (Defense- in- Depth) MLS (Multi-layered Security) DiD model by CISCO Slide 42

… D I D, MLS DiD model by Microsoft The layers of defensive positions in defense in depth are as follows: Data: An attacker’s ultimate target, including your databases, Active Directory service information, documents, and so on. Application: The software that manipulates the data that is the ultimate target of attack. Host: The computers that are running the applications. Internal Network: The network in the corporate IT infrastructure. Perimeter: The network that connects the corporate IT infrastructure to another network, such as to external users, partners, or the Internet. Physical: The tangible aspects in computing: the server computers, hard disks, network switches, power, and so on. Policies, Procedures, Awareness: The overall governing principles of the security strategy of any organization. Without this layer, the entire strategy fails. Slide 43

… D I D , MLS There are *lots of* MLS model by vendors Usually, MLS model by vendor gives security product (safeguard) or service oriented view. Slide 44

Then , which layers are related to network security? Data encryption (new encryption/decryption algorithm) Forensics , anti- Forensics Gigantic Log analysis - Data mining Data layer Database access control and encryption Web application firewall – SQL injection, XSS Software testing - Fuzzying Reverse engineering Database/Application layer Host based IDS, IPS – anomaly detection Anti- virus – behavioral based OS/Platform layer IDS, IPS – misuse detection , anomaly detection Malicious code and Spam mail filtering Network layer Physical security – biometrics Pattern recognition – face, fingerprint, iris, Physical layer Slide 45 shape, hostile object

Security architecture Slide 46 3 major processes of information security Protection Detection Reaction Triangle of information security Confidentiality Integrity Availability Then, what to protect? Asset

Asset , threat, risk, vulnerability and safeguard Slide 47 Asset Threat Risk Vulnerability Safeguard Relation?

Relationship diagram Relationship between threat, risk, asset, vulnerability , and safeguard Threats Vulnerabilities Security Controls Security Risks Assets Security Requirements Asset Values and Potential exploit expose increase increase increase have protect against met by indicate reduce Impacts Slide 48

Lab assignment 1: C onfigure NAT and PAT in Packet Tracer. Slide 49
Tags