Secure Network Access System (SNAS) Indigenous Next Generation - - PowerPoint PPT Presentation
Secure Network Access System (SNAS) Indigenous Next Generation - - PowerPoint PPT Presentation
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions Gigi Joseph, Computer Division,BARC. Gigi@barc.gov.in Intranet Security Components 1a. Network Authentication Network Admission Control 1b. End
Intranet Security Components
- 1a. Network Authentication
- 1b. End Point Compliance
Check
NAC server
Network Admission Control (NAC)
Ethernet Switch Router
Intranet Security Components
- 1a. Network Authentication
- 1b. End Point Compliance
Check
NAC server
Intranet DMZ (Servers)
- 2. Access Control (Firewall)
Firewall
Ethernet Switch Router
Network Admission Control (NAC)
Intranet Security Components
- 1a. Network Authentication
- 1b. End Point Compliance
Check
NAC server
Intranet DMZ (Servers)
- 2. Access Control (Firewall)
- 3. Network Behavioral
Anomaly Detection (IDS)
Firewall
Ethernet Switch Router
Network Admission Control (NAC)
Intranet Security Components
- 1a. Network Authentication
- 1b. End Point Compliance
Check
NAC server
Intranet DMZ (Servers)
- 2. Access Control (Firewall)
- 3. Network Behavioral
Anomaly Detection (IDS)
- 4. NMS
Firewall
Ethernet Switch Router
Network Admission Control (NAC)
Intranet DMZ (Servers)
Router Switch
Firewall + IDS
Typical Network Setup
Application level firewall +IDS/IPS
Internet DMZ
Internet Servers
Organization’s Intranet Perimeter Security systems
Router Switch
Network Backdoor Entry
User Connected to Public Wireless Network
Application level firewall (UTM)
Internet DMZ
Internet Servers
Laptop with WiFi access ( Adhoc Mode) Organization’s Intranet Perimeter Security systems Wireless Access Point
Internet User
Segment
Intranet User Segment Intranet servers
Physically Separated Network for Intranet and Internet
Internet User
Segment
Intranet User Segment Intranet servers
Intranet and Internet Network Bridging
Network Bridging
Internet User Segment Intranet User Segment Intranet servers
Intranet and Internet Network Bridging
Sr.No Identification Parameters 1 End system’s Network levels MAC Address IP Address NIC make & Models Network Applications running on the end system 2 End system’s OS OS version & Patch update 3 Software Present in End system Product /Application name Manufacture Date of installation 4 End system hardware Storage (HDD disk / Other media size ), memory details etc. A unique profile based on above parameters - identify a end system a network Parameters selection and threshold level of matching depends on Security Policy.
SNAS: End System Identification
End System Identification : IP Address of the End system : MAC Address
Perimeter Security systems Internet DMZ
Router
Switch
Intranet DMZ (Servers)
FIREWALL
Enterprise DDOS Handling
F I R E W A L L
Organization Internet servers DDOS Attack
Internet DMZ
Router
Switch
Intranet DMZ (Servers)
FIREWALL F I R E W A L L
Organization Internet servers DDos Attack
Enterprise DDOS Handling
DOS Attacks : ICMP Flooding (E.g Smurf Attack)
IP - 100.0.0.10/A www.nkn.in (164.100.56.206)
Network Broadcast address 100.255.255.255
- f organization 1
IP: 100.0.0.1/A IP:100.0.0.2/A
Source IP = www.nkn.in (164.100.56.206 Destination IP ( 100.255.255.255)
Router Router
PING <100.255.255.255>,
Op code (ARP request) Is gratuitous ? Sender MAC (A: 00:a0:b0:c0:d0:01) Sender IP (10.0.0.1) Target MAC (00:00:00:00:00:00) Target IP (10.0.0.2) Source MAC (00:a0:b0:c0:d0:01) Packet type (0x0806) Data part (ARP request) Checksum (CRC)
Ethernet Switch
IP - 10.0.0.1 MAC-1: 00:a0:b0:c0:d0:01 IP - 10.0.0.2 MAC-2: 00:a0:b0:c0:d0:02
ARP Request (Broadcast)
DOS Attacks : ARP-Flooding
Sr.no Actions Effects 1
Large ARP requests / Sec Switch Performance degrades
2
Every ARP request will have different Source MAC address Identification will be difficult & Ethernet switch table over flow
Client (100.100.100.100:2000) Server (164.100.56.206 :80) (www.nkn.in) SEQ=100, SYN SYN-SENT LISTEN State SYN-RCVD SEQ=200, ACK =101,SYN, ACK SEQ=101, ACK =201, ACK, DATA ESTABLISHED ESTABLISHED Half Open
Source IP ( 100.100.100.100) Destination IP ( 164.100.56.206) Source port (2000) Destination port (80) Sequence number ( 101) ACK number ( 201) HL (4) Reserved (6) URG ACK PSH RST SYN FIN Window (16) Check sum (16) Urgent pointer (16)
Denial of Service attack (TCP SYN Flooding)
Denial of Service attack (TCP SYN Flooding)
Router Router Router
200.200.200.200 100.100.100.100 Source IP Source Port Destination IP Destination port 200.200.200.200 2000 164.100.56.206 80 (web) 200.200.200.200 2002 164.100.56.206 80 (web)
- A.B.C.D
2001 164.100.56.206 80 (web) Random IPs 2002 164.100.56.206 80 (web)
- www. nkn.in
(164.100.56.206)
SNAS – DOS attack handling : Block @ Network entry )
Ethernet Switch Router
WAN DMZ0,1, 2,
Intranet Services Zones
Instruct network device To Block @ network entry
E.g No. TCP-SYN packet > 200 E.g Non –unicast packets / sec > 50
NAC Server
Internet Local N/w UTM (Firewall IPS/IDS)
HTTP Client-Side Exploitation
Trusted Server (NKN) Step 3 : Establish a reverse shell back door using HTTPS
- Any data on the user will go out,
- It can monitor traffic or it can collect adjacent PC’s data etc.
- End system is ready to take part in DDOS attack
Https: www.gigi.com (Command Control Server) https:
- SNAS identifies trust level of hosts, IPs, ports, service,
applications and software products as TRUSTED, UNTRUSTED and UNKNOWN_TRUST.
- Only TRUSTED entities are allowed to exist in the network,
rest all are detected and can be isolated.
- Any running application, installed product which causes
abnormal behaviour should be detected specially after an update
- SNAS can detect any new application, process, port, remote
IP access in the network SNAS : Trust Model
LAN WAN
DDOS Client Controlling Hacker Server
SNAS APPLIANCE
Time
- No. of
- pen
ports Network Traffic generated New service started New software installed Targeted application starts running
SNAS : Network Behavior Monitoring
Router Ethernet Switch Trap Scanning
SNAS : End System Detection
NAC Server
Access Management NAC (Network Access Control) Using SNAS Threat Management Authentication Unique end system Profile based a (SNAS) Access Right a) Network device levels b) ACL / Firewall Detection MAC Notification (Trap) & Periodic Network Scanning Identification Unique end system Profile (SNAS)
SNAS : Network Authentication/Admission Control
Application Transport Network Data-link Physical
NIC Parameters MAC Address System Location IP Address Unicast Traffic Broadcast Traffic Port Status Running services
SNAS -End System Admission Control Parameters
Installed products Running applications Antivirus
Network devices End system Get Data from End systems Get Data from network
Sr.No Authentication Parameters 1 Network levels authentication parameters (L1, L2, L3) Back door entry (Network Interface added or not ) Network parameters change (MAC Address, IP Address, gateway) Network broadcast storm 2 Network Transport level parameter (L4)
- No. of TCP connection request
- No. of TCP connection request to un-trusted IP
- No. of TCP connection Established to un-trusted IP
- No. of un-trusted network application listening
(services) 3 End system’s OS Trust level of OS version & Patch 4 Software Present in End system Trust level of Product /Application name Manufacture 5 Process in the end system Trust level of each process, arguments & process path
Security Policy
Authentication Success Actions : Access to Zones as per policy Authentication Failures Actions Network Entry Level Block, DMZ access Block, Alarms Critical, Info, Emergency)
SNAS -End System Admission Control Parameters
NAC Server
SNAS Access Right Management ( Authentication Success )
Ethernet Switch Router
WAN DMZ0,1, 2,
Intranet Services Zones
Instruct Host aware SNAS firewall to pass through
NAC Server Host Aware Firewall
SNAS Access Right Management ( Authentication Fail )
Ethernet Switch Router
WAN DMZ0,1, 2,
Intranet Services Zones
Instruct Host aware SNAS firewall To block System A
NAC Server Host Aware Firewall
SNAS Access Right Management ( Authentication Fail )
Ethernet Switch Router
WAN DMZ0,1, 2,
Intranet Services Zones
Instruct Ethernet Switch To block System A
NAC Server Host Aware Firewall
SNAS Host Aware Firewall
Management port Organizational LAN
End-Point
End-Point
LAN port Intranet Services Zone – 0 Intranet Services Zone – N Internet Zone WAN port DMZ0 port DMZ N Port
SNAS: Host Aware Firewall Firewall Rules are dynamic and based
- n security state of end systems
Host Aware Firewa
Blended Threats (When Applications Exploit Each Other )
Different Software package on a single Machine IE (7) load “schannel.dll” & “ sqmapi.dll” from various location including user’s desktop Apple Safari browser encounter unknown content type – It downloaded into default location ( i.e. Desktop) Hacker create unknown content type for Safari browser with name “schannel.dll” & “ sqmapi.dll”
Router Switch
Application level firewall +IDS/IPS
Internet DMZ
Organization’s Intranet Perimeter Security systems
Pirated Software Issues When Software try to update themselves , the organizational IPs appear on software update server logs Legal implications if software banned for purchase
Sr.No Parameters Supported by SNAS 1 Detection of presence of USB in user PC Supported 2 USB usage details Supported When the USB connected to PC When it is removed from the PC Size of USB, Space used, free etc 3 Any Application running from PC SNAS can detected Application running from USB 4 Any Application uses resource in USB SNAS can detected applications which uses USB data 5 Same USB putting in Multiple PC SNAS can track USB based on Serial number on which systems, the same USB are used 6 Amount data Copied into USB SNAS can find out amount of Data copied into USB 7 Content of Data copied Not supported by present SNAS version (For this SNAS Client required to be on each PC)
USB Detection on user PC by SNAS
SNAS NMS: Network & End System’s Security Visualization
Internet DMZ
Router
Switch
Perimeter Security systems (ITMA) Intranet DMZ (Servers)
SNAS Placement in Enterprise Network Security Setup
Organization Internet servers
SNAS APPLIANCE
Appliance
Internet User Segment Intranet User Segment Nationwide Intranet
SNAS APPLIANCE SNAS APPLIANCE
SNAS based Solution for Critical Sector network
Perimeter Security systems
Existing Firewall +IDS
Internet DMZ
Internet Servers
Perimeter Security systems
Existing Firewall +IDS
Intranet DMZ
Intranet Servers
Router Router Switch Switch Appliance Appliance
SNAS Demo Setup
Ethernet Switch Router
DMZ 2 (192.168.2.1/c) DMZ 0…n Web Server (192.168.2.10/c) LAPTOP (10.10.10.60/c) 10.10.10.10/c
SNAS APPLIANCE
10.10.10.2/C Wireless Access point