Chapter_6 Flashcards

1
Q

Firewall

A

A combination of hardware and software that isolates internal net from larger Internet,
allowing some packets to pass, blocking others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewall Locations in the Network

A

Between internal LAN and external network
At the gateways of sensitive subnetworks
within the organizational LAN
On end-user machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewalls: Why?

A

Prevent denial of service attacks: E.g., SYN flooding:
Prevent illegal access of internal data
Allow only authorized access to inside network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewalls: Philosophies
1. Block all dangerous destinations
or
2. Block everything; unblock things known to
be both safe and necessary
 Option 1: gets you into an arms race with the
attackers; you have to know everything that is
dangerous, in all parts of your network
 Option 2: is much safer

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewalls: Types

A

Filtering firewalls

Proxy firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stateless Packet Filtering: Examples

A

slide 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packet Filtering

A

 Packet filtering operates by sequentially
checking filtering rules against the datagram being inspected; the first rule matching the datagram determines the action taken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Packet Filtering  Advantages:

A

 Simplicity
 Transparency to users
 High speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Packet Filtering Disadvantages:

A

Difficulty of setting up packet filter rules

 Lack of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Possible attacks and appropriate

countermeasures

A

 IP address spoofing: Intruder attempts to gain access by altering a packet’s IP address
 Countermeasure: discard packets with an inside source address if the packet arrives on an external interface
 Source routing attacks: source station specifies the route that a packet should take as it crosses the Internet, to bypass security
measures
 Countermeasure: discard all packets that use this option
 Tiny fragment attacks: intruder uses the IP fragmentation option
force the TCP header information into a separate packet fragment.
This attack is designed to circumvent filtering rules that depend on
TCP header information.
 Countermeasure: discard all packets where the protocol type is TCP
and IP Fragment Flag is equal to 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Session (Stateful) Packet Filteri

A

 Track status of every TCP connection
 Track connection setup (SYN), teardown (FIN): can
determine whether incoming, outgoing packets “makes sense”
 Timeout inactive connections at firewall: no longer admit
packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Proxy Firewalls

A

Packet-level filtering allows an org to perform coarse-grain filtering on IP/TCP/UDP headers, including IP addr, port #, and acknowledgment bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy Firewalls Application level

A
Filters packets on
application data as well
as on IP/TCP/UDP fields
 Example: allow select
internal users to telnet
outside
host-to-gateway
telnet session
gateway-to-remote
host telnet session
application
gateway
router and filter
1. Require all telnet users to telnet through gateway
2. For authorized users, gateway sets up telnet connection to
destination host. Gateway relays data between two
connections
3. Router filter (blocks) all telnet connections not originating
from gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Proxy Firewalls Application level

A

 Advantages:
 Higher security than packet filters
 Only need to scrutinize a few allowable applications
 Easy to log and audit all incoming traffic
 Disadvantages:
 Additional processing overhead on each connection (2
spliced connections b/w the end users, gateway as splice
point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Circuit-level Gateway

A

Typical use is a situation in which the system
administrator trusts the internal users
 An example is the SOCKS package

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Slide 36

A

TRUE

17
Q

Bastion Host

A

Bastion host is a hardened system implementing
application-level gateway behind packet filter
 All non-essential services are turned off
 Application-specific proxies for supported services
• Each proxy supports only a subset of application’s commands, is logged
and audited, disk access restricted, runs as a non-privileged user in a
separate directory (independent of others)
 Support for user authentication
 All traffic flows through bastion host
 Packet router allows external packets to enter only if their
destination is bastion host, and internal packets to leave
only if their origin is bastion host

18
Q

Limitations of Firewalls and Gateways

A

 IP spoofing: router can’t know if data “really” comes
from claimed source
 If multiple applications need special treatment, each
has own application gateway
 Client software must know how to contact gateway
 E.g., must set IP address of proxy in Web browser
 Filters often use all or nothing policy for UDP

19
Q

Firewalls can and cannot

A
Firewalls can
 Restrict incoming and outgoing traffic by IP
address, ports, or users
 Block invalid packets
Firewalls cannot protect
 Traffic that does not cross it
 Routing around
 Internal traffic
 When mis-configured
 70% of all attacks come from inside the firewall
20
Q

VPN (Virtual Private Network)

A

Securely and privately connect two or more
remote sites of an organization as if on a LAN
 Authenticate users
 Encrypt packets sent over the Internet, “VPN
Tunnel”
 IPSec (IP layer encryption)
 Secure Sockets Layer /TLS
 OpenVPN, an open standard VPN. It is a variation
of SSL-based VPN that is capable of running over
UDP

21
Q

Slide 46

A

TRUE

22
Q

Intrusion Detection Systems

A

 Intrusion:
 A successful attack
 Intruders attempt to bypass the security mechanisms
of computer systems or network infrastructures and
violate security properties: confidentiality, integrity, or
availability.
 Three types:
System scanning - Denial of service (DoS) –
System penetration
 Intrusion detection:
 The process of identifying and responding to intrusion
activities
 The process of monitoring the events occurring in a
computer system or network infrastructures and
analyzing them for signs of intrusions

23
Q

Challenges to IDS

A

 The challenge to current IDSes is how to
maximize accurate alerts.
 False negative: IDS fails to identify an
intrusion attempt
 False positive: IDS incorrectly identifies an
innocuous event as an intrusion

24
Q

IDS vs Firewall

A

 Firewall:
 A system that enforces an access control policy
between two networks.
 As a fence around a system, a firewall has a couple
of well-chosen gates.
 A fence has no capability of detecting intrusions
 IDS:
 does recognize intrusions and to answer: When?
Where? What? Who? How?
 An IDS complements firewall and doublechecks misconfigured firewall

25
Q

IDS vs Firewall

A

 Firewall: Active filtering

 IDS: Passive monitorin

26
Q

Anomaly Detection

A

 Identifies unacceptable deviation from expected
behavior
 An anomaly might include
 Users logging in at strange hours
 Unexplained reboots or changes to system clocks
 Unusual error massages from mailers, daemons, or other
servers
 Multiple, failed login attempts with bad pwds
 Unauthorized use of the su command to gain UNIX root
access
 Users logging in from unfamiliar sites on the network
 Note: unexpected behavior is not necessarily an
attack; it may represent new, legitimate behavior that
needs to be added to the category of expected
behavior

27
Q

Misuse Detection

A

 Sometimes called attack signature detection
 Identifies patterns corresponding to known
attacks
 Describe intrusion signatures based on past known
anomalous activities
 Match observed activities against intrusion
signatures in database
 Decide whether a given pattern of activity is
suspicious or not
 Examples: rule-based system, immune system,
neural networks, state transition analysis, data
mining, abstraction-based model, pattern
matching, case-based reasoning, and genetic
algorithms.

28
Q

Slide 69

A

TRUE

29
Q

Host-based IDSs

A

Definition: A host-based intrusion detection
system is a software that monitors a system or
applications log files. It responds with an alarm or
a countermeasure when a user attempts to gain
access to unauthorized data, files or services.

30
Q

Network-based IDSs

A

 Definition: A network-based intrusion detection
system monitors network traffic and responds with an
alarm when it identifies a traffic pattern that it
deems to be either a scanning attempt or a denial of
service or other attack. It is quite useful in
demonstrating that “bad guys” are actually trying to
get into your computers.

31
Q

Host-based vs. Network-based IDS

A

Slide 74

32
Q

Evaluation of IDS

A

Type I error: (false negative) – Intrusive but
not being detected
 Type II error: (false positive) – Not intrusive
but being detected as intrusive

33
Q

Slide 79 and 80

A

TRUE