Computer Security DD2395
http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak12/
Fall 2012 Sonja Buchegger buc@kth.se Lecture 9 Firewalls (maybe start on Multilevel Security)
1 DD2395 Sonja Buchegger
Computer Security DD2395 - - PowerPoint PPT Presentation
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasak12/ Fall 2012 Sonja Buchegger buc@kth.se Lecture 9 Firewalls (maybe start on Multilevel Security) DD2395 Sonja Buchegger 1 Catch-up Labs l Labbvecka in June
1 DD2395 Sonja Buchegger
DD2395 Sonja Buchegger 2
l Labbvecka in June 2013 l csc.kth.se/labbvecka l http://www.csc.kth.se/labbvecka/ l Extra mini-version for this course in December
DD2395 Sonja Buchegger 3
l Preparation at home, fill out form in instructions l Lab at CSC, be there at start of lab slot l Lab exercise takes 4 hours
l Demo for bonus point: in the widest sense,
l Registration deadline on Friday l Roles DD2395 Sonja Buchegger 4
l History l What they do l Where to put them
DD2395 Sonja Buchegger 5
l Coal-powered trains had a large furnace in the
6
l Ross Anderson: l System security l Filtering l Intrusion detection l Cryptography, securing links DD2395 Sonja Buchegger 7
l Individual: secure workstations and servers l Whole network: also use firewall as perimeter
l It ¡is ¡required ¡that ¡all ¡accesses ¡to ¡objects ¡be ¡checked ¡
9
l In operating systems:
DD2395 Sonja Buchegger 10
l Incoming, outgoing traffic DD2395 Sonja Buchegger 11
l capabilities:
l limitations?
l capabilities:
l limitations:
External (untrusted) network (e.g. Internet) Internal (protected) network (e.g. enterprise network) Firewall
Figure 9.1 Types of Firewalls
(a) General model (d) Application proxy firewall
Physical Network access Internet Transport Application Physical Network access Internet Transport Application Application proxy External transport connection Internal transport connection
(b) Packet filtering firewall
Physical Network access Internet Transport Application End-to-end transport connection End-to-end transport connection
(c) Stateful inspection firewall
Physical Network access Internet Transport Application End-to-end transport connection End-to-end transport connection
(e) Circuit-level proxy firewall
Physical Network access Internet Transport Application Physical Network access Internet Transport Application Circuit-level proxy External transport connection Internal transport connection State info
l applies rules to packets in/out of firewall l based on information in packet header
l typically a list of rules of matches on fields
l two default policies:
l more conservative, controlled, visible to users
l easier to manage/use but less secure
DD2395 Sonja Buchegger 16
l weaknesses
l reviews packet header information but also keeps
l acts as a relay of application-level traffic
l must have proxy code for each application
l more secure than packet filters l but have higher overheads
l sets up two TCP connections, to an inside user
l relays TCP segments from one connection to
l typically used when inside users trusted
l several options for locating firewall: l bastion host l individual host-based firewall l personal firewall
l critical strongpoint in network l hosts application/circuit-level gateways l common characteristics:
l used to secure individual host l available in/add-on for many O/S l filter packet flows l often used on servers l advantages:
l controls traffic flow to/from PC/workstation l for both home or corporate use l may be software module on PC l or in home cable/DSL router/gateway l typically much less complex l primary role to deny unauthorized access l may also monitor outgoing traffic to detect/block
l host-resident firewall l screening router: packet filtering l single bastion inline between routers l single bastion T, with DMZ l double bastion inline: DMZ between bastions l double bastion T l distributed firewall configuration
l recent addition to security products which
l can block traffic like a firewall l using IDS algorithms l may be network or host based
l identifies attacks using both:
l malicious application packets
l behavior patterns that indicate malware
l can be tailored to the specific platform
l can also sandbox applets to monitor behavior l may give desktop file, registry, I/O protection
l inline NIDS that can discard packets or
l uses signature and anomaly detection l may provide flow data protection
l can identify malicious packets using:
l cf. SNORT inline can drop/modify packets
l introduced need for & purpose of firewalls l types of firewalls
l firewall hosting, locations, topologies l intrusion prevention systems