internet security exp
TRANSCRIPT
-
8/3/2019 Internet Security Exp
1/14
..
[FIRE WALLS & INTRUSION DETECTION
SYSTEM]
2011
LIU SAIDA
-
8/3/2019 Internet Security Exp
2/14
[INTERNET SECURITY] May, 2011
Table of contacts:
INTRODUCTION: ..................................................................................................... 3
FIREWALLS ............................................................................................................. 4
Definition/Function: ................................................................................................ 4
2.2. First Generation Packet Filters: ................................................................. 5
2.3. Second Generation Application Layer: ......................................................... 6
Third Generation stateful filters: ...................................................................... 6
Subsequent Development: ..................................................................................... 6
Types: .................................................................................................................... 7
INTRUSION DETECTION SYSTEM (IDS): ................................................................. 7
3.1. Definition ........................................................................................................ 7
3.2. The key Compelling Reasons To Acquire and Use IDSs IDS............................7
3.3.0. Major types of IDSs ...................................................................................... 8
3.3.1. Process model for intrusion detect systems: ...............................................8
3.3.1.1 Information Sources: ................................................................................. 8
3.3.1.2 Analysis: .................................................................................................... 9
3.3.1.3 Response: .................................................................................................. 9
3.4.0. Type of Intrusion Detection System: ............................................................ 9
3.4.1. Host-Based IDS (HIDS): ................................................................................ 93.4.2. Network-Based IDS (NIDS)......................................................................... 10
3.4.3. Application-Base IDS (APIDS)..................................................................... 10
3.4.4. Protocol-Base IDS (PIDS)............................................................................ 12
CONCLUTION: .................................................................................................... 13
5.0. REFERENCES: ............................................................................................... 13
2
-
8/3/2019 Internet Security Exp
3/14
[INTERNET SECURITY] May, 2011
INTRODUCTION:
The idea of a wall to keep intruders dates back thousands of years.
For just a brief example, over ten decade ago, the Chinese built the
Great Wall as protection from neighbouring northern tribes. The
term Firewall was in use by Lightoler as early as [1764] to
describe walls which separated the part of a building that is prone to
fire (e.g. a kitchen).
In this project I will rest my ideas on the concept of firewall in a
more modern setting, computer networks. The predecessors to
firewalls for network security were the routers used in the late 1980s
to separate networks from one another. A network which wasnt
configured properly caused problems on one side of the router and
was largely isolated from the network on the other side; this has
been improved with firewall.
The Intrusion Detection System (IDS) which is designed to detect
unwanted attempts at accessing, manipulating and/or disabling
computer system mainly through a network, such as internet is
either software and/or hardware. It is used to detect several types of
3
-
8/3/2019 Internet Security Exp
4/14
[INTERNET SECURITY] May, 2011
malicious behaviours that can compromise the security and trust of
a computer system. To throw more light to my explanation of An
IDS; IDS can be composed of several sensors which generate
security events, a console to monitor events and intruders.
FIREWALLS
Definitions/function
First Generation - Packet Filters
Second Generation - Application Layer
Third Generation Stateful Filters
Subsequent Development
Types.
Definition/Function:
Firewalls are network devices that enforces an organisations
security policy through a protect network called proxy. Proxies
are program that receive the traffic destination for another
computer system, it also requires a user authentication; they
then verify that users are allowed to connect to the destination
before connecting to the destination server on behalf of the
user.
4
-
8/3/2019 Internet Security Exp
5/14
[INTERNET SECURITY] May, 2011
Firewalls are viewed into several types of techniques which can
be explained using these layers of techniques: Packet Filter,
Application Getaway, Circuit-Level Gateway and Proxy Server.
The firewall is a detected appliance that is running on a
computer system which inspects network traffic passing
through the system denies or permits passage based on a set
rule by the proxy server. It is also software or hardware that is
normally placed in the middle of a protected and unprotected
network. ( ACM Journal Name, Vol. V, No. N, Month 20YY.)
2.2. First Generation Packet Filters:
The first filter system known as Packet Filters Firewalls was
developed 1988 by Digital Equipment Corporation
(DEC).
Mainly, packet filter is responsible for inspecting the packets
which represent the unit that transfer the data between
computers on the internet. Most importantly Bill Cheswick and
Steve Bellovin stated: packet filters pays no attention to
whether a packet is part of an existing stream of traffic (it
stores no information on connection state). Instead, it filters
each packet based only on information contained in the packet
itself. (Bill Cheswick, System development.pp111, 1990)
5
-
8/3/2019 Internet Security Exp
6/14
[INTERNET SECURITY] May, 2011
2.3. Second Generation Application Layer:
An application layer firewalls is mainly a computer networking
firewall that is known as proxy based firewall. It is usually
implemented in a single computer or a stand-alone piece of
hardware. It works on the application layer of TCP/IP stack. (Bill
Cheswick, System development.pp112, 1990)
Third Generation stateful filters:
Stateful filter firewall is any firewalls that perform stateful
packet inspection (SPI), keeping track of the network
connection (such as TCP steams and UDP communication)
travelling across it. From 1989 to 1990 Dave Presetto, Janartan
Sharma and Kshitij Nagam developed the third generation of
firewalls; which is widely known as circuit - level firewall. I
think, the trigger specific rule of the third generation, is to help
prevent attacks which take advantage of the existing
connection. (Bill Cheswick, System development.pp114, 1990)
Subsequent Development:
This technique was developed by Bob Braden and Annette
DeSchon at the University of Southern California in 1992. The
product is known as Visas, which is the first system to have
the virtual integration interface with colours and icons. It is also
the improvement of the other techniques and the existence
deep packet inspection functionality of modern firewalls which
can be shared by the Intrusion Prevention System (IPS). (Bill
Cheswick, System development.pp117, 1990)
6
-
8/3/2019 Internet Security Exp
7/14
[INTERNET SECURITY] May, 2011
Types:
There is several classification of firewall pending where the
communication is taking place. Below are the four important
types of firewall/packet filter:
Network layer and packet filters
Application layer
Proxies
Network address translation
INTRUSION DETECTION SYSTEM (IDS):
3.1. Definition
Intrusion detection systems (IDSs) are software or hardware
systems that automate the process of monitoring the events
occurring in a computer system or network, analyzing them for
signs of security problems (intrusions). It does also can be
viewed as attempts to accommodation the confidentiality,
integrity, availability, or to bypass the security mechanisms of
a computer or network. ()
3.2. The key Compelling Reasons To Acquire
and Use IDSs IDS.
To prevent problem behaviours by increasing the
perceived risk of discovery and punishment for those who
would attack or otherwise abuse the system.
To detect attacks and other security violations not
prevented by other security measures.
7
-
8/3/2019 Internet Security Exp
8/14
[INTERNET SECURITY] May, 2011
To detect and deal with the preamble to attacks
(commonly experienced as network probes and other
doorknob rattling activities).
To document the existing threat to an organization.
To act as quality control for security design and
administration, especially of large and complex
enterprises.
To provide useful information about intrusions that dotake place, allowing improved diagnosis, recovery, and
correction of causative factors
3.3.0. Major types of IDSs
In intrusion detection system, there are several types available
today and they are characterized by different monitoring and
analysis approaches. These approaches can be described in
terms of a generic process model for intrusion detection
system.
3.3.1. Process model for intrusion detect
systems:
Intrusion Detection System is specifically divided into three main
fundamental functional components, which are:
3.3.1.1 Information Sources:
Apparently there are different sources of event information
used to determine whether an intrusion has taken place. These
sources can be explained from different level of the system,
with network, host and application monitoring most common.
8
-
8/3/2019 Internet Security Exp
9/14
[INTERNET SECURITY] May, 2011
3.3.1.2 Analysis:
The part of intrusion detection system that actually organizes
and makes sense of the event derived from the information
sources, deciding when those events indicate that intrusion are
occurring or have already taken place. The most common
analysis approaches are misuse detection and anomaly
detection.
3.3.1.3 Response:
The response been taken once the system detect Intrusion.
By these set of action they are typically grouped into active and
passive measures. With active measures involving some
automated intervention on the part of the system and passive
measures involving reporting Intrusion Detection System.
3.4.0. Type of Intrusion Detection System:Traditionally, there are just three general types of IDS.
I. Host Based intrusion detection system (HIDS).
II. Network Based intrusion detection system (NIDS).
III. Application-Based intrusion detection system (APIDS).
IV. Protocol-Based intrusion detection system (PIDS).
3.4.1. Host-Based IDS (HIDS):
HIDSs operate on information collected from within an
Individual computer system; HIDSs can see the outcome of
an attempted attack, as they can directly access and monitor
the data files and system. Normally utilize information sources
9
-
8/3/2019 Internet Security Exp
10/14
[INTERNET SECURITY] May, 2011
of two types, operating system audit trails, and system logs. eg
(OSSEC).
3.4.2. Network-Based IDS (NIDS). The majority of commercial intrusion detection systems are
network based which are systems that operate on network data
flows, detect attacks by capturing and analyzing network
packets, listening on a network segment or switch, monitoring
the network traffic affecting multiple host and consist of a set
of single-purpose sensor or hosts placed at various points in anetwork. Eg (SNORT).
3.4.3. Application-Base IDS (APIDS).
2.0. APIDS are subset of host-based IDSs that analyze the
events transpiring in software application. They are
mostly use by applications transaction log files, which
stands as a system or agent that would typically sit
within a group of servers, monitoring and analyzing the
communication on application specific protocols.
Example of place or location been use; in a web server
with a database. (Denning, Dorothy E., "An Intrusion
Detection Model," Proceedings of the Seventh IEEE
Symposium on Security and Privacy, May 1986, pages
119-131)
10
-
8/3/2019 Internet Security Exp
11/14
[INTERNET SECURITY] May, 2011
11
-
8/3/2019 Internet Security Exp
12/14
[INTERNET SECURITY] May, 2011
3.4.4. Protocol-Base IDS (PIDS).It is also consists of a system or agent like the Application-
based IDS, it sit at the front end of a server, monitoring and
analyzing the communication protocol between a connected
device. It is used to monitor HTTPS protocol stream for a web
server. (Barbara, Daniel, Couto, Julia, Jajodia, Sushil, Popyack,
Leonard, and Wu, Ningning, "ADAM: Detecting Intrusions by
12
-
8/3/2019 Internet Security Exp
13/14
[INTERNET SECURITY] May, 2011
Data Mining," Proceedings of the IEEE Workshop on Information
Assurance.)
CONCLUTION:
Though they both relate to network security, an intrusion
detection system (IDS) differs from a firewall in that a firewall
looks outwardly for intrusions in order to stop them from
happening. Firewalls limit access between networks to prevent
intrusion and do not signal an attack from inside the network.
An IDS evaluates a suspected intrusion once it has taken place
and signals an alarm. An IDS also watches for attacks that
originate from within a system. This is traditionally achieved by
examining network communications, identifying heuristics and
patterns (often known as signatures) of common computer
attacks, and taking action to alert operators. A system that
terminates connections is called an intrusion prevention
system.
5.0. REFERENCES:
2.0. ACM Journal Name, Vol. V, No. N, Month 20YY.
2.1. Bill Cheswick, System development.pp104, 1990.
3.0. Denning, Dorothy E., "An Intrusion Detection Model,"
Proceedings of the Seventh IEEE Symposium on
Security and Privacy, May 1986, pages 119-131
3.1. Lunt, Teresa F., "IDES: An Intelligent System for
Detecting Intruders," Proceedings of the Symposium on
13
-
8/3/2019 Internet Security Exp
14/14
[INTERNET SECURITY] May, 2011
Computer Security; Threats, and Countermeasures;
Rome, Italy, November 22-23, 1990, pages 110-121.
3.2. Barbara, Daniel, Couto, Julia, Jajodia, Sushil,
Popyack, Leonard, and Wu, Ningning, "ADAM: Detecting
Intrusions by Data Mining," Proceedings of the IEEE
Workshop on Information Assurance.