Final Exam Prep - Textbook Items Flashcards
Types of Firewalls (4)
Packet Filtering Firewall
Stateful Inspection Firewalls
Application-Level Gateway
Circuit-Level Gateway
Firewall Basing (3)
Bastion Host
Host-Based Firewalls
Personal Firewall
Firewall Location and Configurations (3)
DMZ Networks
Virtual Private Networks
Distributed Firewalls
Intrusion Prevention Systems
Host-Based IPS
Network-Based IPS
Distributed or Hybrid IPS
Snort Inline
network-based IPS (NIPS)
inline NIDS with the authority to modify or discard packets and tear down TCP connections. As with a NIDS, a NIPS makes use of techniques such as signature/heuristic detection and anomaly detection.
Pattern matching: Stateful matching: Protocol anomaly: Traffic anomaly: Statistical anomaly:
9.1 List three design goals for a firewall.
9.1 Answers
- All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the local network except via the firewall. Various configurations are possible, as explained later in this chapter.
- Onlyauthorizedtraffic,asdefinedbythelocalsecuritypolicy,willbeallowed to pass. Various types of firewalls are used, which implement various types of security policies, as explained later in this chapter.
- The firewall itself is immune to penetration. This implies the use of a hard- ened system with a secured operating system. Trusted computer systems are suitable for hosting a firewall and often required in government applications.
IP address spoofing
intruder transmits packets from the outside with a source IP address field containing an address of an internal host.
countermeasure is to discard packets with an inside source address if the packet arrives on an external interface often implemented at the router external to the firewall.
packet filtering firewall
applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet
configured to filter packets going in BOTH DIRECTIONS
Filtering based on: Source IP address: Destination IP address Source and destination transport-level address IP protocol field Interface
Tiny fragment attacks
The intruder uses the IP fragmentation option to cre- ate extremely small fragments and force the TCP header information into a separate packet fragment.
defeated by enforcing a rule that the first fragment of a packet must contain
a predefined minimum amount of the transport header. If the first fragment is rejected, the filter can remember the packet and discard all subsequent fragments.
application-level gateway
also called an application proxy, acts as a relay of application-level traffic .The user contacts the gateway using a TCP/ IP application, such as Telnet or FTP, and the gateway asks the user for the name of the remote host to be accessed. When the user responds and provides a valid user ID and authentication information, the gateway contacts the application on the remote host and relays TCP segments containing the application data between the two endpoints. If the gateway does not implement the proxy code for a specific application, the service is not supported and cannot be forwarded across the fire- wall. Further, the gateway can be configured to support only specific features of an application that the network administrator considers acceptable while denying all other features.
Application-level gateways tend to be more secure than packet filters.
bastion host
a system identified by the firewall administrator as a critical strong point in the network’s security. Typically, the bastion host serves as a platform for an application-level or circuit-level gateway
bastion host hardware platform executes a secure version of its operating system, making it a hardened system.
Only the services that the network administrator considers essential are installed
circuit-level gateway firewall
or circuit-level proxy.
can be a stand-alone system or it can be a specialized function performed by an application-level gateway for certain applications.
does not permit an end-to-end TCP connection; rather, the gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host. Once the two connections are established, the gateway typically relays TCP segments from one connection to the other without examining the contents.
The security function consists of determining which connections will be allowed.
A typical use of circuit-level gateways is a situation in which the system administrator trusts the internal users. The gateway can be configured to support application-level or proxy service on inbound connections and circuit-level functions for outbound connections
SOCKS
host-based firewall
software module used to secure an individual host.
filter and restrict the flow of packets.
A common location for such firewalls is a server.
advantages
Filtering rules can be tailored to the host environment. Protection is provided independent of topology. Thus both internal and exter- nal attacks must pass through the firewall. Used in conjunction with stand-alone firewalls, the host-based firewall provides an additional layer of protection. A new type of server can be added to the network, with its own firewall, without the necessity of altering the network firewall configuration.
host-based IPS (HIPS)
can make use of either signature/heuristic or anomaly detection techniques to identify attacks
Examples of the types of malicious behavior addressed by a HIPS include the following:
- Modification of system resources: Rootkits, Trojan horses, and backdoors operate by changing system resources, such as libraries, directories, registry settings, and user accounts.
- Privilege-escalation exploits
- Buffer-overflow exploits:
- Access to e-mail contact list:
- Directory traversal:
Distributed or Hybrid IPS
Type of NIPS
gathers data from a large number of host and network-based sensors, relays this intelligence to a central analysis system able to correlate, and analyze the data