IDPS
IDPS
)
• Configuring firewall rule sets (cont’d.)
– Proper sequence: perform most resource-
intensive actions after the most restrictive ones
• Reduces the number of packets that undergo
intense scrutiny
• Firewalls deal strictly with defined patterns
of measured observation
– Are prone to programming errors, flaws in rule
sets, and other inherent vulnerabilities
1
Management of Information Security, 3rd ed.
Managing Firewalls (cont’d.)
2
Management of Information Security, 3rd ed.
Managing Firewalls (cont’d.)
3
Management of Information Security, 3rd ed.
Managing Firewalls (cont’d.)
4
Management of Information Security, 3rd ed.
Next: dealing with intrusions
• Intrusion detection and prevention
• Intrusion: attacker attempts to gain
entry or disrupt normal operation
• Examples: password cracking,
unauthorized data access, unauthorized
software installation, unauthorized
configuration changes, denial of service
attacks
5
Typical intrusion steps
• Initial reconnaissance (IP addrs, names,
platforms…)
• Network probes: port scanning, ping
• Breaking in: gaining access to systems
• Take over the network: install rootkits,..
• Launch main attack: steal data, modify
content, denial of service attacks,…
6
Intrusion detection
A possible scenario
(http://flylib.com/books/4/213/1/html/2/images/fig04_13.jpg)
7
Intrusion Detection and
Prevention Systems
• The term intrusion detection/prevention
system (IDPS) can be used to describe
current anti-intrusion technologies
• Can detect an intrusion
• Can also prevent that intrusion from
successfully attacking the organization by
means of an active response
8
Management of Information Security, 3rd ed.
Intrusion Detection and
Prevention Systems (cont’d.)
9
Management of Information Security, 3rd ed.
Intrusion Detection and
Prevention Systems (cont’d.)
10
Management of Information Security, 3rd ed.
Intrusion Detection and
Prevention Systems (cont’d.)
IDPSs are either
• host based to protect server or host
information assets
• network based to protect network
information assets, or
11
Management of Information Security, 3rd ed.
Intrusion Detection and
Prevention Systems (cont’d.)
17
Management of Information Security, 3rd ed.
Network-Based IDPS - contd
• Looks for patterns of network traffic
• Match known and unknown attack
strategies against their knowledge base to
determine whether an attack has occurred
• Yield many more false-positive readings
than host-based IDPSs
18
Management of Information Security, 3rd ed.
Advantages of NIDPSs
• Good network design and placement of
NIDPS can enable organization to use a
few devices to monitor large network
• NIDPSs are usually passive and can be
deployed into existing networks with
little disruption to normal network
operations
• NIDPSs not usually susceptible to direct
attack and may not be detectable by
attackers
22
Management of Information Security, 3rd ed.
Statistical Anomaly-Based IDPS-2
Advantages:
• Able to detect new types of attacks,
because it looks for abnormal activity of
any type
• IDPS can detect new types of attacks
Disadvantages
• Requires much more overhead and
processing capacity than signature-based
• May generate many false positives
23
Management of Information Security, 3rd ed.
Selecting IDPS Approaches and
Products
• Technical and policy considerations
– What is your systems environment?
– What are your security goals and
objectives?
– What is your existing security policy?
• Organizational requirements and
constraints
– What are requirements that are levied from
outside the organization?
– What are your organization’s resource
constraints?
Principles of Information Security, Fourth Edition 24
Selecting IDPS Approaches and
Products - contd
• IDPSs product features and quality
– Is the product sufficiently scalable for your
environment?
– How has the product been tested?
– What is the user level of expertise targeted
by the product?
– Is the product designed to evolve as the
organization grows?
– What are the support provisions for the
product?
• Location 1: Behind
each external firewall,
in the network DMZ
• Location 2: Outside
an external firewall
• Location 3: On major
network backbones
• Location 4: On critical
subnets
40
Management of Information Security, 3rd ed.
Wireless Networking Protection
• Most organizations that make use of
wireless networks use an implementation
based on the IEEE 802.11 protocol
• The size of a wireless network’s footprint
– Depends on the amount of power the
transmitter/receiver wireless access points
(WAP) emit
– Sufficient power must exist to ensure quality
connections within the intended area
• But not allow those outside the footprint to connect
41
Management of Information Security, 3rd ed.
Wireless Networking Protection - 2
• War driving
– Moving through a geographic area or building,
actively scanning for open or unsecured WAPs
• Common encryption protocols used to
secure wireless networks
– Wired Equivalent Privacy (WEP)
– Wi-Fi Protected Access (WPA)
42
Management of Information Security, 3rd ed.
Wired Equivalent Privacy (WEP)
43
Management of Information Security, 3rd ed.
Wi-Fi Protected Access (WPA)
• Wi-Max (WirelessMAN)
– An improvement on the technology developed
for cellular telephones and modems
– Developed as part of the IEEE 802.16
standard
– A certification mark that stands for Worldwide
Interoperability for Microwave Access
45
Management of Information Security, 3rd ed.
Bluetooth
• A de facto industry standard for short range
(approx 30 ft) wireless communications
between devices
• The Bluetooth wireless communications link
can be exploited by anyone within range
– Unless suitable security controls are implemented
• In discoverable mode devices can easily be
accessed
– Even in nondiscoverable mode, the device is
susceptible to access by other devices that have
connected with it in the past
46
Management of Information Security, 3rd ed.
Bluetooth (cont’d.)
• Does not authenticate connections
– It does implement some degree of security
when devices access certain services like dial-
up accounts and local-area file transfers
• To secure Bluetooth enabled devices:
– Turn off Bluetooth when you do not intend to
use it
– Do not accept an incoming communications
pairing request unless you know who the
requestor is
47
Management of Information Security, 3rd ed.
Managing Wireless Connections
• One of the first management requirements
is to regulate the size of the wireless
network footprint
– By adjusting the placement and strength of the
WAPs
• Select WPA or WPA2 over WEP
• Protect preshared keys
48
Management of Information Security, 3rd ed.
Honeypots, Honeynets, and
Padded Cell Systems
• Honeypots: decoy systems designed to lure
potential attackers away from critical systems
• Honeypots are designed to:
– Divert attacker from accessing critical systems
– Collect information about attacker’s activity
– Encourage attacker to stay on system long
enough for administrators to document event and,
perhaps, respond
• Honeynets: collection of honeypots
connecting several honey pot systems on a
subnet
56
Management of Information Security, 3rd ed.
Figure 7-9 Sam Spade
Principles of Information Security, Fourth Edition 57
Scanning and Analysis Tools
• Port mappers
• Network mappers
• Firewall analysis
• OS detection tools
• Vulnerability scanners
• Packet sniffers
• Wireless sniffers
• Password crackers
58
Port Scanners
59
Management of Information Security, 3rd ed.
Port Scanners (cont’d.)
60
Management of Information Security, 3rd ed. Source: Course Technology/Cengage
Port Scanners (contd.)
• Well-known ports
– Those from 0 through 1023
– Registered ports are those from 1024 through
49151
– Dynamic and private ports are those from
49152 through 65535
• Open ports must be secured
– Can be used to send commands to a
computer, gain access to a server, and exert
control over a networking device
61
Management of Information Security, 3rd ed.
Network mappers
• Mostly use ICMP ping
• Most port scanners can be used as
network mappers, e.g. Nmap, LanState
62
Firewall Analysis
• Several tools automate remote discovery of
firewall rules and assist the administrator in
analyzing them
• Administrators who feel wary of using the
same tools that attackers use should
remember:
– It is intent of user that will dictate how information
gathered will be used
– In order to defend a computer or network well, it is
necessary to understand ways it can be attacked
• A tool that can help close up an open or
poorly configured firewall will help network
defender minimize risk from attack
Principles of Information Security, Fourth Edition 63
Firewall Analysis – contd.
``Firewalking’’ steps
• Network discovery – apply traceroute to a
host inside network (finds TTL count to
firewall)
• Scanning – TCP/UDP packets with TTL of 1-
hop past firewall sent; if the firewall allows
packets in, ICMP TTL Expired message will
be sent by binding host
• E.g. Firewalk
64
OS Detection Tools
• Detecting a target computer’s operating
system (OS) is very valuable to an
attacker
• There are many tools that use
networking protocols to determine a
remote computer’s OS, e.g. Nmap,
Xprobe
• Strategies: passive fingerprinting, active
fingerprinting
67
OS detection countermeasures
• Modify responses to various network
events/packets
• Morph, IP Scrubber: “scrubs” clean any
outgoing packets of OS relates information
• IP personality (http://ippersonality.sourceforge.net)
(patch for Linux kernel)
68
Vulnerability Scanners
• Capable of scanning networks for very
detailed information
• Variants of port scanners
• Identify exposed user names and groups,
show open network shares, and expose
configuration problems and other server
vulnerabilities
69
Management of Information Security, 3rd ed.
Vulnerability Scanners - 2
• Nessus – freeware
• Used by over 75000 companies
• Different versions for Unix, Mac, Windows
• Detects open ports, mis-configurations
(e.g. missing patches), default passwords,
presence of viruses, back-door programs
70
Management of Information Security, 3rd ed.
Packet Sniffers
• A network tool that collects and analyzes
packets on a network
– It can be used to eavesdrop on network traffic
• Connects directly to a local network from
an internal location
• To use a packet sniffer legally, you must:
– Be on a network that the organization owns
– Be directly authorized by the network’s owners
– Have the knowledge and consent of the users
– Have a justifiable business reason for doing so
71
Management of Information Security, 3rd ed.
Packet Sniffers - 2
• Any network card can be switched to
“promiscuous” mode to sniff all LAN
packets
• Simply tapping into the Internet is a
violation of wiretapping laws
• Example: Wireshark
72
Management of Information Security, 3rd ed.
Wireless Sniffers
• Wireless sniffing is much easier than wired
sniffing
• Very difficult to detect – leaves no traceable
evidence
• Example: NetStumbler
73
Management of Information Security, 3rd ed.
Password Crackers
Most systems store encrypted passwords.
• MS Windows typically uses C:\Windows\
System32\config folder
• Cannot be accessed directly by users, BUT
can be accessed by installing LCP, pwdump
or FGDUMP (require Admin privilege to
install).
• Encryption algorithm known (NT LAN
Manager in Win 7)
• Case sensitive (unlike older versions of
MSWin), applies MD4
74
Password Crackers – contd.
Attack types
• Brute force – very slow
• Dictionary attack – only common disctionary
words used
• Precomputed dictionary attack – saves time
required for encryption
• E.g. Cain and Able or “Cain” (some virus
scanners detect it as malware! Microsoft
Security Essentials “Tool: This program has
potentially unwanted behavior”)
75
Managing Scanning and Analysis
Tools
76
Management of Information Security, 3rd ed.
Managing Scanning and Analysis
Tools (cont’d.)
• Drawbacks:
– Tools do not have human-level capabilities
– Most tools function by pattern recognition, so
they only handle known issues
– Most tools are computer-based, so they are
prone to errors, flaws, and vulnerabilities of
their own
– Tools are designed, configured, and operated
by humans and are subject to human errors
77
Management of Information Security, 3rd ed.
Managing Scanning and Analysis
Tools (cont’d.)
• Drawbacks: (cont’d.)
– Some governments, agencies, institutions, and
universities have established policies or laws
that protect the individual user’s right to access
content
– Tool usage and configuration must comply with
an explicitly articulated policy, and the policy
must provide for valid exceptions
78
Management of Information Security, 3rd ed.
Other measures
• Content filters
• Cryptographic tools
79
Content Filters
• Protect systems from misuse
– And unintentional denial-of-service conditions
• A software program or a hardware/software
appliance that allows administrators to
restrict content that comes into a network
• Common application of a content filter
– Restriction of access to Web sites with non-
business-related material, such as
pornography, or restriction of spam e-mail
– Content filters ensure that employees are
using network resources appropriately
80
Management of Information Security, 3rd ed.
Using Cryptographic Controls
81
Management of Information Security, 3rd ed.
Using Cryptographic Controls
(cont’d.)
84
Management of Information Security, 3rd ed.
Using Cryptographic Controls
• IP Security (IPSec)
– The primary and dominant cryptographic authentication
and encryption product of the IETF’s IP Protocol
Security Working Group
– Combines several different cryptosystems:
• Diffie-Hellman key exchange for deriving key material between
peers on a public network
• Public key cryptography for signing the Diffie-Hellman
exchanges to guarantee the identity of the two parties
• Bulk encryption algorithms, such as DES, for encrypting the
data
• Digital certificates signed by a certificate authority to act as
digital ID cards
85
Management of Information Security, 3rd ed.
Using Cryptographic Controls
(cont’d.)
86
Management of Information Security, 3rd ed.
Using Cryptographic Controls
(cont’d.)
89
Management of Information Security, 3rd ed.
Using Cryptographic Controls
(cont’d.)
90
Management of Information Security, 3rd ed.
Using Cryptographic Controls
(cont’d.)
91
Management of Information Security, 3rd ed.
Managing Cryptographic Controls
• Don’t lose your keys
• Know who you are communicating with
• It may be illegal to use a specific encryption
technique when communicating to some
nations
• Every cryptosystem has weaknesses
• Give access only to those with a business
need
• When placing trust into a certificate
authority, ask “Who watches the watchers?”
92
Management of Information Security, 3rd ed.
Managing Cryptographic
Controls (cont’d.)
93
Management of Information Security, 3rd ed.
Summary
• Introduction
• Access controls
• Firewalls
• Intrusion detection and prevention systems
• Wireless network protection
• Scanning and analysis tools
• Cryptography
94
Management of Information Security, 3rd ed.