Lecture 5: Firewalls, intrusion detection Flashcards
Explain the “Principle of Complete Mediation”
It is required that all accesses to objects are to be checked, in order to ensure that they are allowed
Explain what a “Reference monitor” is
It is a module in operating systems, that:
- Checks requests against table of allowed requests, only lets authorised ones go through
- Monitor is itself tamper proof, and
- Verifiable
What does “ingress” and “egress” mean in the context of firewalls
Ingress: incoming traffic
Egress: outgoing traffic
List some capabilities that a firewall provides
- Defines a single choke point
- Provides a location for monitoring security events
- Convenient platform for some internet functions, such as NAT, usage monitoring, IPSEC VPNs
List some limitations of a firewall
- Cannot protect against attacks bypassing the firewall
- May not protect fully against internal threats
- Improperly secure wireless LAN
- Laptop, PDA, and portable storage devices could be infected outside then used inside
List four different types of firewalls
- Packet filtering firewall
- Stateful inspection firewall
- Application proxy firewall
- Circuit-level firewall
Explain what a “Packet filtering firewall” does, and where it is used
- Applies rules to packets in/out of firewall
- Based on information in packet header
- E.g., Src/dest, IP address & port, IP protocol, interface
- Typically, a list of rules of matches on fields
- If match, rule says if forward or discard packet
- Two default policies:
- Discard – prohibit unless expressly permitted
- Forwards – permit unless expressly prohibited
Give some examples of weakness’ with “Packet Filter firewalls”
- Cannot prevent attack on application bugs
- Limited logging functionality
- Does not support advanced user authentication
- Vulnerable to attacks on TCP/IP protocol bugs
- Improper config can lead to breaches
Explain what a “Stateful inspection firewall” does, and how it works
Reviews packet header information BUT also keeps info on TCP connections
- Typically have low, “known” port number for server, and
- High, dynamically assigned client port number
- Compared to simple packet filtering, stateful inspection tightens rules for TCP traffic by using a directory of TCP connections
- Only allow incoming traffic to high-numbered ports for packets matching an entry in this directory
Explain what an “Application-level gateway” does, and how it works
- Acts as a relay of application-level traffic:
- User contacts gateway with remote host name
- Authenticates themselves
- Gateway contacts application on remote host and relays TCP segments between server and user
- Must have proxy code for each application
- More secure than packet filters, but
- Higher overheads
Explain what a “Circuit-level gateway” is , and how it works
- Sets up two TCP connections, one to and inside user and one to an outside host
- Relays TCP segments from one connection to the other without examining contents
- Hence independent of application logic
- Just determines whether relay is permitted
- Typically used when inside users trusted
- May use application-level gateway inbound and circuit-level gateway outbound
- Hence lower overheads
List three different ways of basing a firewall
- Bastion host
- Individual host-based firewall
- Personal firewall
Explain what a “Bastion host” is, and how it works
• Used to secure individual host
• Available in/add-on for many O/S
• Filter packet flows
• Often used on servers
• Advantages:
o Tailored filter rules for specific host needs
o Protection from both internal/external attacks
o Additional layer of protection to org firewall
Explain what a “Personal firewall is”, and how it works
- Controls traffic flow to/from PC/workstation
- For both home or corporate use
- May be software module on PC
- Or in home router/gateway
- Typically, much less complex
- Primary role to deny unauthorized access
- May also monitor outgoing traffic to detect/block worm/malware activity
Give some examples of different intrusions
- Remote root compromise
- Web server defacement
- Guessing/cracking passwords
- Copying viewing sensitive data/databases
- Running a packet sniffer