IDS Firewall Flashcards

1
Q

What is a firewall?

A

A network security system that monitors and controls incoming/outgoing network traffic based on predetermined security rules.

= barrier between trusted network and outside (untrusted network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is a firewall important?

A

(3)
- prevents services to be accessed from outside the network
- segments networks
- reduces attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of firewalls

A

By implementation:
- software - slow, easy to deploy on single machines
- hardware - faster, safer, expensive

By the amount of network layers they process:
- packet size (data link layer)
- MAC (data link) and IP (IP layer) filtering
- port filtering (transport)
- Deep packet (application layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 types of firewalls covered in this course?

A
  • packet filtering firewall
  • stateful inspection firewall
  • application-level gateway
  • circuit-level gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Packet filtering firewall - characteristics

A

Pros:
- simplest - compares packet header info to a given set of rules
- very fast
- allows access to services based on network data

Cons:
- it needs many rules => hard to maintain, prone to human error
- does not allow blocking of specific app commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stateful inspection firewall - characteristics

A
  • maintains state between packets => more complex rules
  • similar to packet filtering + remembers past events (allows for rules that allow traffic from outside IF the connection was started from inside network) ( lmao thats a mouthful)
  • more expensive than packet filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application-level gateway - characteristics

A
  • AKA application proxy
  • relays app layer data between user and app
  • can block specific app features that u dont want used
  • requires lots of processing
  • does NOT scale well
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Circuit-level gateway - characteristics

A
  • AKA circuit-level proxy
  • relays app layer data between user and app
  • not parsing app layer contents, but
    determines which connections are allowed
  • e.g. SOCKS proxy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the SOCKS proxy behaviour / algorithm

A
  1. User authenticates with proxy (TCP Handshake client-proxy)
  2. User requests specific IP and port (SOCKS Handshake client-proxy)
  3. IF user allowed to make that connection (TCP Handshake proxy-server), proxy sets up connection to IP and port and relays the app layer data

=> all data requests go through proxy now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of firewall can we use to detect and stop TCP SYN scan?

A

Stateful firewall
- blocks excessive scanning (eg put a limit of requests that can be made)
- BUT if attackers are slow enough, they are still able to scan network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a DMZ?

A

= De-Militarized Zone
- allows some services to be reached from the Internet
- DMZ is separated from Internal Network using a second firewall (can be used for more stringent filtering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a VPN?

A

= Virtual Private Network
- a way to link networks/provide a way for employees to work from home
- used to encrypt data on lower layers to create “transparent” tunnel that allows users to connect securely to LAN network over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an IDS?

A

= Intrusion Detection System
- device/software that monitors network for malicious activity or policy violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of IDS?

A
  • Host-based (HIDS) - monitors events on a host (eg system logs)
  • Network-based (NIDS) - monitors network data, can use deep-packet inspection to find malicious activity
  • Heuristic - match data to rules
  • Signature - match data to known indicators (eg. flagged IP addresses)
  • Anomaly - determines ‘normal data’ and ids data that deviates from the norm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe Anomaly detection IDS

A
  • gathers base-line data that is considered “normal”
  • classifies data using diff approaches:
    1. statistical
    2. Knowledge based - rely on expert knowledge
    3. Machine-learning - automatically done
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Alert fatigue? How does it influence IDS?

A

= too many alarms lead to a situation when analysts dont have enough time to investigate all of them
- hard to balance nb of FalsePositives with sensitivity of IDS
- some insurances dont cover attacks that were id’ed but not investigated
=> too much noise can be a liability

17
Q

Describe a Host-Based IDS and its data sources (4)

A
  • monitors activity on system (eg virus scanner)

data sources:
- system call traces
- log files
- integrity checksums
- registry access patterns

18
Q

Describe a Distributed HIDS

A
  • collects all data of various systems in the same place to create a more effective IDS
  • requires devices to run programs which collect telemetry and forward it to a central location
    => privacy concerns of collecting info about employees’ systems
19
Q

Describe Network-based IDS

A
  • monitors activity on network
  • types of sensors - inline, passive
  • location of sensors matters loads
20
Q

What is a Honeypot?

A
  • decoy system designed to lure potential attackers away from critical systems
  • Goals:
    1. Divert attacks away from real systems
    2. Collect info about attackers’ goals
    3. Alert Admins of strange behaviour
  • set up such that there is no reason to EVER contact them, so if you do, reasonable chance that its malicious
21
Q

Where can sensors be placed?

A
  • behind/ at level of border firewall
  • in dmz
  • in specific parts of network