8. Firewalls, IDS, DDoS Flashcards
Name 2 Firewall goals
Provide defense in depth by:
1. Blocking attacks against hosts and services
2. Control traffic between zones of trust
What type of firewall placement protects the whole network?
Network-based firewall
A host-based firewall is faithful to local configuration
True
In the context of a TCP handshake, it’s possible to have a SYN/ACK packet without an originating SYN
False
Describe a state holding attack
An attacker flooding Syn’s without Acknowledgments to a firewall under stateful TCP policy, causing an exhaustion of resources.
What is the DMZ
A security layer between internal network and external network (internet).
E.g. company may have a web server in DMZ to give customers access from the internet, but web server can’t directly access internal database.
Can Signature based IDS detect zero-based attacks? They have … false positive rate.
No they cannot. Low false positive rate.
Can Anomaly based IDS detect zero-based attacks? They have … false positive rate.
Yes they can. High false positive rate.
How do Signature based IDS flag potential threats?
Detects intrusions by comparing incoming data to database of known patterns or signatures of malicious activity. Requires frequent updates to db to remain effective.
How do Anomaly based IDS flag potential threats?
By identifying deviations from normal network behaviour. Established a baseline of what ‘normal’ traffic looks like and flags significantly different activity.
If IDS received 1000000 packets where 20 were intrusions. What is the intrusion rate?
20/1000000 =0.00002
What would be the most important characteristic of a Firewall amongst effectiveness, security, transparency, expressiveness, efficiency and ease of use?
Efficiency (otherwise user’s won’t want to have it on their device)
What’s a DNS amplification attack?
- Send DNS query (60 bytes question)
- Spoof IP source address
- DNS server responds to target with large reply (3k bytes answer)
‘DNS amplification’ style attack may also go to … server
Network time protocol (NTP) server
What is comically considered the worst DDoS amplifier on the internet?
DNSSEC