Title: Firewalls and Network Security
1 Firewalls andNetwork Security
- William Crespo
- Vincent Lauria
- Michael Theriault
2Synopsis of Presentation
- Security Issues Today
- Firewalls
- How do they work?
- What can they do?
- The future of Security
3Security Issues Today
- What are the issues and problems?
- Who are the intruders and why?
- What are their techniques?
4What are the Issues Problems?
- Security was not a fundamental design
consideration - The Internet is growing exponentially
- User dependence is increasing
- With increasing complexity
- There are billions of entry points
5Attack Sophistication vs.Required Intruder
Knowledge
Required Intruder Knowledge
Back-Orifice
Attack Sophistication
Auto. Toolkits
Widespread DDoS
Packet spoofing
Auto. probe scanning
1990
2000
Results from a Carnegie Mellon University Study
6Who are the intruders?
7Motives
- Money
- Access to additional resources
- Competitive advantages
- Curiosity and Mischief
8Possible Attacks
- Compromises and Vulnerabilities
- DDoS (Distributed Denial of Service)
- Sniffing
- Port Scanning
- Malicious code
9Compromises and Vulnerabilivties
- Unauthorized access to a machine
- Usually due to
- No current patches
- Misconfiguration
10Example of Smurf DoS attack
ICMP request with spoofed IP of target
Intruder
Target
11Example of Smurf DoS attack
Intruder
Flood Target with replies
Target
12Sniffing
- Examines traffic on same physical network
- Intruder must have physical access to network
- Used to gather usernames and passwords
13Port Scanning
- Wide array of tools to scan open many open ports
quickly - Can find out a lot about a network (including OS)
by looking at open ports - Also allows intruders to find unprotected Windows
shares
14Malicious Code
- Includes Viruses and Trojan Horses
- Ex. Melissa, I Love you Virus
- Difficult to control, because inexperienced user
can take actions without understanding
consequences
15Consequences
- Financial loss
- Web sites unable to fulfill providing a service
- Loss of data
- Loss of public confidence
16Consequences
US Senate 99
New York Times 98
Dept. of Interior 99
17FIREWALLS
- What do they do?
- How do they work?
18What is a firewall?
- A firewall is a machine that monitors all traffic
to and from a site - This allows for monitoring, filtering, logging,
and proper access to the network
19Firewall Zones
Zones
Servers
DMZ (web servers)
Workstations
20Our Hardware Implementation
- We created a basic deny-all firewall using
Windows 2000 Server - Opened DNS, Web, and ACS2 telnet
- Dynamically assigned IP with NAT
- The next screen shows a snapshot of the Win2K
Routing Service - We will demonstrate the firewall using this
laptop as a workstation
21Example
DNS Telnet Web
22How do Firewalls work?
- Most firewalls function through packet filtering
- Filter based upon port or address
Courtesy http//www.vicomsoft.com/knowledge
/reference/firewalls1.html
23Filtering based on Port
- Filtering based on port occurs by examining the
Transport layer - Deny-all
- Reject all packets except to required services
Courtesy http//www.vicomsoft.com/knowledge
/reference/firewalls1.html
24Filtering Based on Address
- The incoming and outgoing address can be examined
to see if the computer is allowed access to the
network - However, this can be circumvented by an attacker
who fakes the incoming address, making it look as
if they are allowed
25How firewalls prevent
- Lets look over some of the common attacks we
spoke about
26Preventing Compromises and Vulnerabilities
- By hiding internal network information, a
firewall can protect internal servers - Web serves still need to be patched, but we can
hide information about them - i.e. Services and OS running
27Other Prevention
- Preventing DDoS
- Turn off ping except to trusted IPs
- Preventing Port Scanning
- Turn off all ports except ports needed
- Use NAT to hide IPs
- Preventing Malicious Code
- Difficult to block with firewall
- Internal zones can prevent spreading and
contamination
28Direction of Internet Vulnerabilities
- Sophistication of attacks is increasing
- Knowledge is being passed to less knowledgeable
- Vendor testing cycle is decreasing
- Relying on patches
29Direction of Internet Security
- Better encryption methods
- Adding more security to the transport and IP
layer of protocols - IPSEC
- Packet level security based on socket or
destination address
30We would like to thank
- Professor D. Starobinski
-
- The class for your time and patience.
Thank you