How Firewall Works

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 30

Firewalls and

Network Security

William Crespo
Vincent Lauria
Michael Theriault

12/08/21
SC 546 1
Synopsis of Presentation
• Security Issues Today
• Firewalls:
– How do they work?
– What can they do?

• The future of Security


Security Issues Today:
• What are the issues and problems?
• Who are the intruders and why?
• What are their techniques?
What are the Issues & Problems?
• Security was not a fundamental design
consideration
• The Internet is growing exponentially
• User dependence is increasing;
• With increasing complexity
• There are billions of entry points
Attack Sophistication vs.
Required Intruder Knowledge
Required Intruder
Knowledge Back- Attack
Orifice
Sophistication
Auto.
Toolkits

Widespread
DDoS
Packet
spoofing
Auto. probe
scanning

1990 2000
Results from a Carnegie Mellon University Study
Who are the intruders?
• Criminals

• “Curious” Intruders

• Insiders

• Corporate Spies
Motives:
• Money
• Access to additional resources
• Competitive advantages
• Curiosity and Mischief
Possible Attacks:
• Compromises and Vulnerabilities
• DDoS (Distributed Denial of Service)
• “Sniffing”
• Port Scanning
• Malicious code
Compromises and Vulnerabilivties
• Unauthorized access to a machine
• Usually due to:
– No current patches
– Misconfiguration
Example of Smurf DoS attack:

ICMP request with


spoofed IP of target

Intruder

Target
Example of Smurf DoS attack:

Intruder Flood Target


with replies

Target
Sniffing
• Examines traffic on same physical
network
• Intruder must have physical access to
network
• Used to gather usernames and
passwords
Port Scanning
• Wide array of tools to scan open many
open ports quickly
• Can find out a lot about a network
(including OS) by looking at open ports
• Also allows intruders to find unprotected
Windows shares
Malicious Code
• Includes Viruses and Trojan Horses
– Ex. Melissa, I Love you Virus

• Difficult to control, because


inexperienced user can take actions
without understanding consequences
Consequences
• Financial loss
• Web sites unable to fulfill providing a
“service”
• Loss of data
• Loss of public confidence
Consequences

US Senate – ‘99

New York Times –’98

Dept. of Interior – ‘99


FIREWALLS

• What do they do?


• How do they work?
What is a firewall?
• A firewall is a machine that monitors all
traffic to and from a site
• This allows for monitoring, filtering,
logging, and proper access to the
network
Firewall Zones:

} Zones

Servers DMZ (web servers)


Workstations
Our Hardware Implementation
• We created a basic deny-all firewall using
Windows 2000 Server
– Opened DNS, Web, and ACS2 telnet
– Dynamically assigned IP with NAT

• The next screen shows a snapshot of the


Win2K Routing Service
– We will demonstrate the firewall using this
laptop as a workstation
Example

DNS
DNS
Telnet
Telnet
Web
Web
How do Firewalls work?
• Most firewalls function through packet
filtering
– Filter based upon port or address

Courtesy http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering based on Port
• Filtering based on port occurs by
examining the Transport layer
• Deny-all
– Reject all packets except to required services

Courtesy http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering Based on Address
• The incoming and outgoing address can
be examined to see if the computer is
allowed access to the network
• However, this can be circumvented by an
attacker who fakes the incoming address,
making it look as if they are allowed
How firewalls prevent
• Lets look over some of the common
attacks we spoke about
Preventing Compromises and
Vulnerabilities
• By hiding internal network information, a
firewall can protect internal servers
• Web serves still need to be patched, but
we can hide information about them
– i.e. Services and OS running
Other Prevention:
• Preventing DDoS:
– Turn off ping except to trusted IP’s

• Preventing Port Scanning:


– Turn off all ports except ports needed
– Use NAT to hide IP’s

• Preventing Malicious Code


– Difficult to block with firewall
– Internal zones can prevent spreading
and contamination
Direction of Internet Vulnerabilities
• Sophistication of attacks is increasing
• Knowledge is being passed to less
knowledgeable
• Vendor testing cycle is decreasing
– Relying on patches
Direction of Internet Security
• Better encryption methods
• Adding more security to the transport and
IP layer of protocols
– IPSEC
• Packet level security based on socket or
destination address
We would like to thank:
Professor D. Starobinski
&
The class for your time and patience.

You might also like