Lecture - 21 22 23
Lecture - 21 22 23
Information Security
Lecture 21-22-23
Intrusion, Intrusion Prevention,
Firewalls, Intrusion Detection
Vasos Vassiliou
[email protected]
• Security Intrusion
• a security event, or combination of multiple security
events, that constitutes a security incident in which an
intruder gains, or attempts to gain, access to a system (or
system resource) without having authorization to do so.
• Intrusion Detection
• a security service that monitors and analyzes system
events for the purpose of finding, and providing real-time
or near real-time warning of attempts to access system
resources in an unauthorized manner.
Hackers
• weaknesses
• cannot prevent attack on application bugs
• limited logging functionality
• do no support advanced user authentication
• vulnerable to attacks on TCP/IP protocol bugs
• improper configuration can lead to breaches
• attacks
• IP address spoofing, source route attacks, tiny fragment
attacks
Stateful Inspection Firewall
• capabilities:
• defines a single choke point
• provides a location for monitoring security events
• convenient platform for some Internet functions such as
NAT, usage monitoring, IPSEC VPNs
• limitations:
• cannot protect against attacks bypassing firewall
• may not protect fully against internal threats
• improperly secure wireless LAN
• laptop, PDA, portable storage device infected outside
then used inside
Limitations of Firewalls
• Firewalls suffer from limitations and these limitations and
other weaknesses have led to the development of other
technologies. Among the current firewall limitations are:
• Firewalls cannot protect against a threat that by-passes it, like a dial-in
using a mobile host,
• Firewalls do not provide data integrity because it is not possible,
especially in large networks, to have the firewall examine each and
every incoming and outgoing data packet for anything.
• Firewalls cannot ensure data confidentiality because, even though
newer firewalls include encryption tools, it is not easy to use these
tools. It can only work if the receiver of the packet also has the same
firewall.
• Firewalls do not protect against internal threats, and
• Firewalls cannot protect against transfer of virus-infected programs or
files
• run continually
• be fault tolerant
• resist subversion
• impose a minimal overhead on system
• configured according to system security policies
• adapt to changes in systems and users
• scale to monitor large numbers of systems
• provide graceful degradation of service
• allow dynamic reconfiguration
Intrusion Detection Systems
53
Approaches to Intrusion Detection
• Statistical anomaly detection
• Involves the collection of data relating to the behavior of
legitimate users over a period of time
• Then statistical tests are applied to observed behavior to
determine whether that behavior is not legitimate user
behavior
• Rule-based detection
• Involves an attempt to define a set of rules or attack
patterns that can be used to decide that a given behavior
is that of an intruder
• Often referred to as signature detection
production value •Thus, any attempt to communicate with the system is most likely a
probe, scan, or attack