Network Security - Information Security

Basic


  • It is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies
  • Network Security Model
    • Image Not Found
    • M represents original data & E represents cipher data
    • Information channel
      • Medium of data propagation from sender to receiver
      • Most vulnerable for attack
    • Trusted Third Party (TTP) sources distribute the keys to sender and receiver
  • Network Security Controls
    • Physical
      • Designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on
    • Technical
      • Protect data that is stored on the network or which is in transit across, into or out of the network
    • Administrative
      • Consist of security policies and processes that control user behavior, including how users are authenticated, their level of access and also how IT staff members implement changes to the infrastructure
  • Digital Signature (DS)
    • DS Generation Algorithm takes private key and message at senders side and generates signature
    • DS Verification Algorithm takes public key of senders to verify and decrypt

Firewall


  • Firewall consists of software and hardware set up between an internal computer network and the Internet
  • Computer network manager sets up the rules for the firewall to filter out unwanted intrusions
  • Types
    • Packet Filtering
      • Set of rules based on Source address (SA), Destination address (DA), Port number, Protocols
      • If rule matched then forward or discard
      • Default action is generally to discard if it does not matches any of the rules
      • Data/Payload is not checked
      • Image Not Found
    • Application-level Gateway (Proxy Server)
      • More secure
      • Processing overload
      • Checks data/payload
      • Host thinks that it is making a request to internet but in reality it is making a request to proxy and internet thinks that it is talking to host but in reality it is talking to proxy
      • Image Not Found
  • Traffic Filtering
    • Traffic-filtering Rules
      • Determines the manner in which the incoming and outgoing traffic flows in the network will be regulated
      • Set of traffic-filtering rules can be adopted as an independent packet filtering policy or as a part of the information security policy
    • Traffic-filtering technology
      • That will be implemented depending on the requirements and needs
    • Implement defined rules
      • On the selected technology and optimize the performance of devices accordingly
    • Maintain all the components of the solution
      • Including not only devices, but also the policy

Intrusion Detection System (IDS)


  • Monitoring the operation of computer systems or networks and analyzing the processes they perform, which can point to certain incidents
  • Incidents are events posing a threat to or violating defined security policies, violating AUP (Acceptable Use Policy) rules, or generally accepted security norms
  • They appear as a result of the operation of various malware programmes, as a result of attempts at unauthorized access to a system through public infrastructure (Internet), or as a result of the operation of authorized system users who abuse their privileges
  • Network Intrusion Prevention (IP)
    • Detecting network intrusion events, but also includes the process of preventing and blocking detected or potential network incidents
  • IDP (Intrusion Detection and Prevention)
    • Identifying potential incidents, logging information about them, attempting to prevent them and alerting the administrators responsible for security
    • Identify problems concerning the adopted security policies, to document existing security threats and to discourage individuals from violating security rules
  • Intruder Types
    • Outside (Masquerader)
      • Person not having authorization
    • Inside (Misfeasor)
      • Person having authorization
  • Stateful Protocol Analysis
    • Stateful protocol analysis is a process of comparing predefined operation profiles with the specific data flow of that protocol on the network
    • Predefined profiles of operation of a protocol are defined by the manufacturers of IDP devices and they identify everything that is acceptable or not acceptable in the exchange of messages in a protocol
    • Unlike anomaly-based detection, where profiles are created based on the hosts or specific activities on the network, stateful protocol analysis uses general profiles generated by the equipment manufacturers
    • Testing tools are used for testing the detection, recognition and response capabilities of devices tha perform packet filtering (including those that use network address translation), such as firewalls, idses/ipses, routers and switches
    • These test the traffic filtering devices ability to detect and/or block dos attacks, spyware, backdoors, and attacks against applications such as IIS, SQL server and WINS
    • Standard traffic sessions can be used to test how packet filtering devices handle a variety of protocols including HTTP, FTP, SNMP and SMTP
  • Detection Methods
    • Signature-based Detection
      • The behavior of an already detected security threat, described in a form that can be used for the detection of any subsequent appearance of the same threat, is called an attack signature
      • Process of comparing the known forms in which the threat has appeared with the specific network traffic in order to identify certain incidents
      • Extremely inefficient in the detection of completely unknown threats, of threats hidden by using various techniques, and of already known threats that have somehow been modified in the meantime
    • Anomaly-based Detection
      • This method of IDP is based on detecting anomalies/deviation in a specific traffic flow in the network
      • Anomaly detection is performed, based on the defined profile of acceptable traffic and its comparison with the specific traffic in the network
      • Acceptable traffic profiles are formed by tracking the typical characteristics of the traffic in the network during a certain period of time
      • The greatest advantage of this detection method is its exceptional efficiency in detecting previously unknown security threats
  • Categories of IDS
    • Host-based IDS (HIDS)
      • Host-based IDSs are designed to monitor, detect and respond to activity and attacks on a given host
      • Takes snapshot of existing system vs previous system
      • Detects Files deleted or modified
      • Because attackers mainly focus on operating system vulnerabilities to break into hosts, in most cases, the host-based IDS is integrated into the operating systems that the host is running
    • Network-based IDS (NIDS)
      • Network traffic based IDSs capture network traffic to detect intruders
      • Matches traffic to the library of known attacks
      • Monitors, Capture and Analyze network traffic
      • Detects malicious data present into packets
      • NIDS analysis is very difficult in busy network
      • An agent is an autonomous or semi-autonomous piece of software that runs in the background and performs useful tasks for another
      • Relative to IDSs, an agent is generally a piece of software that senses intrusions locally and reports attack information to central analysis servers
  • Intrusion Prevention System (IPS)
    • An IPS is a network security tool that can not only detect intruders, but also prevent them from successfully launching any known attack
    • Intrusion prevention systems combine the abilities of firewalls and intrusion detection systems
    • An active response device dynamically reconfigures or alters network or system access controls, session streams or individual packets based on triggers from packet inspection and other detection devices
    • Active response happens after the event has occurred; thus, a single packet attack will be successful on the first attempt but will be blocked in future attempts; for example, a DDoS attack will be successful on the first packets but will be blocked afterwards
    • While active response devices are beneficial, this one aspect makes them unsuitable as an overall solution
    • Network intrusion prevention devices, on the other hand, are typically inline devices on the network that inspect packets and make decisions before forwarding them on to the destination
  • Intrusion Prevention Technologies
    • System Memory and Process Protection
      • This type of intrusion prevention strategy resides at the system level
      • Memory protection consists of a mechanism to prevent a process from corrupting the memory of another process running on the same system
      • Process protection consists of a mechanism for monitoring process execution, with the ability to kill processes that are suspected of being attacks
    • Inline Network Devices
      • This type of intrusion prevention strategy places a network device directly in the path of network communications with the capability to modify and block attack packets as they traverse the device’s interfaces
      • It acts much like a router or firewall combined with the signature-matching capabilities of IDS. The detection and response happens in real time before the packet is passed on to the destination network
    • Session Sniping
      • This type of intrusion prevention strategy terminates a TCP session by sending a TCP RST packet to both ends of the connection
      • When an attempted attack is detected, the TCP RST is sent and the attempted exploit is flushed from the buffers and thus prevented
      • Note that the TCP RST packets must have the correct sequence and acknowledgement numbers to be effective
    • Gateway Interaction Devices
      • This type of intrusion prevention strategy allows a detection device to dynamically interact with network gateway devices such as routers or firewalls
      • When an attempted attack is detected, the detection device can direct the router or firewall to block the attack
  • Risks with IDS
    • Recurring issue of false positives in today’s intrusion detection systems
      • Legitimate traffic displaying characteristics similar to malicious traffic
    • Attackers who discover or suspect the use of intrusion prevention methods can purposely create a DoS attack against legitimate networks and sources by sending attacks with spoofed source IP addresses
    • Gateway interaction timing and race conditions
      • Detection device directs a router or firewall to block the attempted attack, However, because of network latency, the attack has already passed the gateway device before it receives this direction from the detection device
Share: