Module 8 - Remote Access
Module 8 - Remote Access
Module 8 - Remote Access
packet types:
❑ authenticationheader (AH) protocol
❑ encapsulating security payload (ESP) protocol
IPSec Transport and Tunnel Modes
A Simplified comparison of IP V4 and IPSec Tunnel mode. A more detailed drawing would be: Transit IP header + IPSec ESP
header + original IP header + TCP/UDP header + payload + IPSec ESP trailer + IPSec ESPAuth.
relatively recent protocol enhancement that creates a standard for how
authentication is performed over an 802 standards-based network
❑ A user dials in (via modem, DSL, etc.) as a client to a remote access server, and
provides credentials (user/password) in response to the remote access server’s
request
❑ The remote access server (itself a client to a RADIUS server) communicates the
credentials to the RADIUS server, after encrypting it by computing an MD5 hash (see
chapter 4) of it using a “secret” shared between client and server (this is an example
of one way in which credentials are communicated)
❑ The RADIUS server uses a user/password database or perhaps integration with a
network- based authentication system like Windows passwords or LDAP to validate
the password, and returns the results to the remote access server
❑ The remote access server then accepts or denies the connection
stands for Terminal Access Controller Access Control
System+
developed by Cisco
✓ They can be very operating system- Must have a process on every system
specific and have more detailed you want to watch
signatures Can have a high cost of ownership
✓ They can reduce positive rates and maintenance
✓ They can examine data after it has been Uses local system resources
decrypted Has a very focused view and cannot
✓ They can be very application specific relate to
✓ They can determine whether or not an activity around it
alarm may impact that specific system If logged locally, could be
compromised or disabled
system that examines the network traffic as it passes by and analyzes traffic
according to protocol, type, amount, source, destination, content, traffic
already seen, etc.
Network-based IDS look for certain activities that characterize hostile actions or
misuse such as:
❑ Match a potential intruder scanning for open web servers on a specific network
❑ Identify a Nessus scan
❑ Identify a ping flood attack
In anomaly detection model, the IDS must know what “normal” behavior on the host
or network being protected really is.
Anomaly detection was developed to make the system capable of dealing with
variations in traffic and to determine which activity patterns were malicious.
In misuse detection mode, the IDS looks for suspicious activity or activity that
violates specific policies and then reacts as it has been programmed.
The misuse detection model is more efficient since it takes fewer resources to
operate, does not need to learn what “normal” behavior is, and generates an alarm
whenever a pattern is successfully matched.
sometimes called a digital sandbox
At t a ck er
Hon eyp ot
system
formalized response of reacting to a situation such as a security
breach or system outage