Network Security Architecture: Dr. Jasim Saeed
Network Security Architecture: Dr. Jasim Saeed
Network Security Architecture: Dr. Jasim Saeed
Architecture
Dr. Jasim Saeed
Overview
• Network Security Architecture
• Segmentation
• Wireless
• Security Domains
• VPN
• Firewall Technology
• Address Translation
• Denial of Service attacks
• Intrusion Detection
• Both firewalls and IDS are introduced.
Segment
• Separate Functionality
• Limit infection vectors
802.11 or Wi-Fi
• Is it adequate?
• Locating and securing all perimeter points is quite difficult
• Less effective for large border
• Inspecting/ensuring that remote connections are
adequately protected is difficult
• Insiders attack is often the most damaging
Virtual Private Networks
IPSec
SSL • Confidentiality?
• Confidentiality? • Data Integrity?
• Data integrity? • User Authentication?
• User • Network access control?
authentication? • Client configuration required.
• Network access
control? VLAN – Layer 2 tunnelling technology
• In addition, limited • Confidentiality?
traffic • Data Integrity?
• User authentication?
• Network access control?
• Not viable over non-VLAN internetworks
Security Domains with VPNs
“Typical” corporate network
Firewall Demilitarized
Intranet
Zone (DMZ)
Mail forwarding
DNS (DMZ)
File Server Web Server
Web Server
User machines
User machines
User machines
Internet
Firewall Goal
Inside Outside
Application Proxy Firewall
X Y
FTP: X to Y
GET /etc/passwd
Inside Outside
Egress Filtering
Block outgoing traffic not Ingress Filtering
sourced from network X Block incoming traffic from
one of the set of invalid
networks
Denial of Service
• Example attacks
• Smurf Attack
• TCP SYN Attack
• Teardrop
• DoS general exploits resource limitations
• Denial by Consumption
• Denial by Disruption
• Denial by Reservation
TCP SYN Attack
• Exploits the three-
way handshake
S D S D
ACKy+1
CONNECTED SYN+ACK
Figure1. Three-wayHandshake
Figure2. SYNFloodingAttack
TCP SYN Attack Solutions
• Intermediate Firewall/Router
• Limit number of half open connections
• Ingress and egress filtering to reduce spoofed
addresses
• Does not help against DDoS bot networks
• Reactively block attacking addresses
• Generally expensive to acquire technology to do fast
enough
• Fix Protocol - IPv6
“Smurf”
ICMP echo (spoofed source address of victim)
Sent to IP broadcast address
ICMP echo reply
Internet
Perpetrator Victim
Smurf Issues
• Amplification attack
• Small effort on attacker results in big impact on victim
• Victim fails unexpectedly under high load
• May just stop responding
• May stop performing normal security checks
• Exploiting protocol failure
• Fixed in IPv6
• Old attack
• Blocked by most firewalls
Teardrop Attack
Offset 0, len 60
192.168.1.0/24 Enforcing
inside Device outside Internet
128.128.1.0/26
10.10.10.0/24
Static Mapping
Hidefrominsidetooutside
192.168.1.0/24behind128.274.1.1
Staticm apfrominsidetoDM Z
192.168.1.5to128.274.1.5
192.168.1.0/24 Enforcing
inside Device outside Internet
128.128.1.0/26
Src=192.168.1.5 DMZ
Dst=10.10.10.1
10.10.10.0/24
Src=128.274.1.5
Dst=10.10.10.1
FW Runtime Characteristics
TACACS or Radius
AAA Server
outside Inside
• Direct data
• Network packets
• System calls
• Indirect data
• Syslog data, Windows event logs
• Events from other intrusion detection systems
• Netflow information generated by routers about network
traffic
Mis-use/Signature Detection
• Fixed signatures are used in most deployed IDS products
• E.g., Cisco, ISS, Snort
• Like virus scanners, part of the value of the product is the team of
people producing new signatures for newly observed malevolent
behavior
• The static signature mechanism has obvious problems in that a
dedicated attacker can adjust his behaviour to avoid matching the
signature.
• The volume of signatures can result in many false positives
• Must tune the IDS to match the characteristics of your network
• E.g., what might be unusual in a network of Unix systems might be
normal in a network of Windows Systems (or visa versa)
• Can result in IDS tuned too low to miss real events
• Can hide real attacks in the mass of false positives
Example Signature
Outside Inside
Promiscuous
Interface
NIDS Agent
Management
NIDS Director
NIDS Remediation Options
Outside
Inside
NIDS Agent
NIDS Director
Summary