SlideShare a Scribd company logo
Chapter 5 Network Defenses
Objectives Explain how to enhance security through network design Define network address translation and network access control List the different types of network security devices and explain how they can be used
 
Security through Network Design Subnetting IP addresses are actually two addresses: one part is a network address and one part is a host address Subnetting  or  subnet addressing Splits a large block of IP addresses into smaller groups
Image from Cisco CCNA Class 1
Subnetting at CCSF Image from Cisco CCNA class 1, modified Whole College:  147.144.0.0 /16 147.144.0.1 through 147.144.255.254 CNIT Dept:  147.144.20.0 /24 147.144.20.1 through 147.144.20.254 Eng Dept:  147.144.51.0 /24 147.144.51.1 through 147.144.51.254
Advantages of Subnetting
Subnets Improve Security Each subnet can be isolated from the rest of the network Traffic between subnets can be monitored and restricted at the routers Subnets also allow network administrators to hide the internal network layout Outsiders only see your public servers, not your private subnets
Virtual Local Area Network (VLAN) VLANs segment a network with switches, not routers A VLAN allows scattered users to be logically grouped together even though they may be attached to different switches Can reduce network traffic and provide a degree of security similar to subnetting: VLANs can be isolated so that sensitive data is transmitted only to members of the VLAN
 
Accounting machines are on their own VLAN
VLAN Security VLAN communication can take place in two ways All devices are connected to the same switch Traffic is handled by the switch itself Devices are connected to different switches A special “tagging” protocol must be used, such as the IEEE 802.1Q-2005 A VLAN is heavily dependent upon the switch for correctly directing packets Attackers could take control of the switch itself, if it has a default or weak password Specially crafted traffic can also "hop" from one VLAN to another
Network Convergence Telephone, data, and video all using the same IP network Voice over IP, Video over IP Advantages Cost savings Management Application development Infrastructure requirements Reduced regulatory requirements Increased user productivity
Vulnerabilities in Converged Networks
Demilitarized Zone (DMZ) A separate network that sits outside the secure network perimeter Outside users can access the DMZ but cannot enter the secure network
DMZ with One Firewall
DMZ with Two Firewalls
Network Address Translation (NAT) Hides the IP addresses of network devices from attackers Private addresses IP addresses not assigned to any specific user or organization Function as regular IP addresses on an internal network Non-routable addresses--traffic addressed to private addresses is discarded by Internet routers
Network Address Translation (NAT) NAT removes the private IP address from the sender’s packet And replaces it with an alias IP address When a packet is returned to NAT, the process is reversed An attacker who captures the packet on the Internet cannot determine the actual IP address of the sender
Network Address Translation (NAT) Private IP Addresses Address Translation 192.168.1.101 -> 147.144.1.101 192.168.1.102 -> 147.144.1.102 192.168.1.103 -> 147.144.1.103 192.168.1.151 -> 147.144.1.104 Public IP Addresses
Port Address Translation (PAT) Normally performed along with NAT Each packet is given the same IP address but a different TCP port number Allows many machines to share the same public IP address
NAT with PAT Web browser:  192.168.1.101 Port 1100 Email: 192.168.1.101 Port 1102 Web browser: 192.168.1.103 Port 1100 Address Translation 192.168.1.101 Port 1100 -> 147.144.1.1 Port 2100 192.168.1.101 Port 1102 -> 147.144.1.1 Port 2101 192.168.1.103 Port 1100 -> 147.144.1.1 Port 2102
Network Access Control (NAC) Examines a computer before it is allowed to connect to the network Each computer must meet security policy first, such as Windows patches up to date Antivirus software Antispyware software Etc. Any device that does not meet the policy is only allowed to connect to a “quarantine” network where the security deficiencies are corrected
 
 
Network Security Devices Firewalls Proxy servers Honeypots Network intrusion detection systems Host and network intrusion prevention systems Protocol analyzers Internet content filters Integrated network security hardware
Firewall Typically used to filter packets Sometimes called a packet filter Designed to prevent malicious packets from entering the network A firewall can be software-based or hardware-based Hardware firewalls usually are located outside the network security perimeter As the first line of defense
Firewall (continued)
Firewall (continued) The basis of a firewall is a  rule base Establishes what action the firewall should take when it receives a packet (allow, block, and prompt) Stateless packet filtering Looks at the incoming packet and permits or denies it based strictly on the rule base Stateful packet filtering Keeps a record of the state of a connection between an internal computer and an external server Then makes decisions based on the connection as well as the rule base
Stateless Firewall Rules
Stateful Firewall Rules Note error in textbook in left column, 3 rd  row State  = Established
Inbound and Outbound Traffic Filtering Most personal software firewalls today also filter outbound traffic as well as inbound traffic Filtering outbound traffic protects users by preventing malware from connecting to other computers and spreading But it annoys them with these alerts
Proxy Server I want to see yahoo.com I will get yahoo.com and save a copy Internet Here is my copy of yahoo.com
Proxy Server Clients never directly connect to the Internet This saves bandwidth, because one copy of a popular Web page can be used many times Allows a company to block forbidden Web sites It also prevents many attacks the same way NAT does Reverse proxy Does not serve clients but instead routes incoming requests to the correct server
Reverse Proxy Connect to Web server 1
Honeypot Intended to trap or trick attackers A computer typically located in a DMZ that is loaded with software and data files that appear to be authentic Yet they are actually imitations of real data files Three primary purposes of a honeypot: Deflect attention Early warnings of new attacks Examine attacker techniques
Network Intrusion Detection Systems (NIDS) Network intrusion detection system (NIDS) Watches for attempts to penetrate a network NIDS work on the principle of comparing new behavior against normal or acceptable behavior A NIDS looks for suspicious patterns Passive intrusion detection just logs the traffic and sends alerts
Network Intrusion Detection Systems (NIDS) (continued)
Intrusion Prevention Systems Finds malicious traffic and deals with it immediately Also called Active Intrusion Detection A typical IPS response may be to block all incoming traffic on a specific port
Host Intrusion Prevention Systems (HIPS) Installed on each system that needs to be protected Rely on agents installed directly on the system being protected Work closely with the operating system, monitoring and intercepting requests in order to prevent attacks
Host Intrusion Prevention Systems (HIPS) Most HIPS monitor the following desktop functions: System calls File system access System Registry settings Host input/output HIPS are designed to integrate with existing antivirus, anti-spyware, and firewalls HIPS provide an additional level of security that is proactive instead of reactive
Network Intrusion Prevention Systems (NIPS) Work to protect the entire network and all devices that are connected to it By monitoring network traffic NIPS can immediately react to block a malicious attack NIPS are special-purpose hardware platforms that analyze, detect, and react to security-related events Can drop malicious traffic based on their configuration or security policy
Protocol Analyzers Three ways for detecting a potential intrusion Detecting statistical anomalies (unusual traffic) Examine network traffic and look for well-known patterns of attack Use protocol analyzer technology Protocol analyzers Can fully decode application-layer network protocols Parts of the protocol can be analyzed for any suspicious behavior Such as an overly long User-Agent field in an HTTP GET request
Internet Content Filters Internet content filters Monitor Internet traffic and block access to preselected Web sites and files A requested Web page is only displayed if it complies with the specified filters Unapproved Web sites can be restricted based on the Uniform Resource Locator (URL) or by matching keywords
Internet Content Filters (continued)
Integrated Network Security Hardware Types of hardware security appliances: Dedicated security appliances provide a single security service Multipurpose security appliances that provide multiple security functions Integrated network security hardware Combines or integrates multipurpose security appliances with a traditional network device such as a switch or router Particularly attractive for networks that use IDS

More Related Content

PPT
Ch08 Authentication
PPT
Ch04 Network Vulnerabilities and Attacks
PPTX
Trusted systems
PPT
Intruders and Viruses in Network Security NS9
PPT
Network security and protocols
PPTX
Security Attack Analysis for Finding and Stopping Network Attacks
PPTX
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
PPT
Network security
Ch08 Authentication
Ch04 Network Vulnerabilities and Attacks
Trusted systems
Intruders and Viruses in Network Security NS9
Network security and protocols
Security Attack Analysis for Finding and Stopping Network Attacks
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Network security

What's hot (20)

PPTX
Network security and firewalls
PPT
Intoduction to Network Security NS1
PPT
Ch02 System Threats and Risks
PPT
Ch08 Microsoft Operating System Vulnerabilities
PPT
Intruders
PPT
Network Security
DOCX
Network and web security
PPSX
Intrusion detection system
PPT
Firewalls
PPTX
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
PPT
Ch06 Wireless Network Security
PPTX
امن نظم المعلومات وامن الشبكات
PDF
Network Security & Attacks
PPTX
Network security - Defense in Depth
PDF
Information Security Lecture Notes
PDF
PDF
PPTX
Intrusion detection
 
PDF
Network security for E-Commerce
PDF
Intrusion Detection and Prevention System in an Enterprise Network
Network security and firewalls
Intoduction to Network Security NS1
Ch02 System Threats and Risks
Ch08 Microsoft Operating System Vulnerabilities
Intruders
Network Security
Network and web security
Intrusion detection system
Firewalls
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ch06 Wireless Network Security
امن نظم المعلومات وامن الشبكات
Network Security & Attacks
Network security - Defense in Depth
Information Security Lecture Notes
Intrusion detection
 
Network security for E-Commerce
Intrusion Detection and Prevention System in an Enterprise Network
Ad

Viewers also liked (20)

PPT
Network security
PPT
Ch03 Protecting Systems
PPT
Microsoft Operating System Vulnerabilities
PPT
Ch10 Conducting Audits
PPT
Ch09 Performing Vulnerability Assessments
PPT
Ch13 Business Continuity Planning and Procedures
PPT
Ch01 Introduction to Security
PPT
Ch14 Policies and Legislation
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PPT
Ch11 Basic Cryptography
PPT
Ch07 Access Control Fundamentals
PDF
Network Security Presentation
PPTX
PPTX
PPTX
Collaborative defence strategies for network security
PPTX
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
ODP
Python 3000
PPTX
Python programming lab2
PDF
OSCON 2008: Porting to Python 3.0
Network security
Ch03 Protecting Systems
Microsoft Operating System Vulnerabilities
Ch10 Conducting Audits
Ch09 Performing Vulnerability Assessments
Ch13 Business Continuity Planning and Procedures
Ch01 Introduction to Security
Ch14 Policies and Legislation
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch11 Basic Cryptography
Ch07 Access Control Fundamentals
Network Security Presentation
Collaborative defence strategies for network security
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Python 3000
Python programming lab2
OSCON 2008: Porting to Python 3.0
Ad

Similar to Ch05 Network Defenses (20)

PPTX
PPT
Day4
PPTX
Chapter_1_Introduction to Network Security-1.pptx
PPT
Ch13 Protecting Networks with Security Devices
PPT
PPTX
Network security
PPTX
firrewall and intrusion prevention system.pptx
PPTX
Network security
PPTX
Firewall presentation
PDF
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
PPTX
Cyber security tutorial2
PPTX
Firewalls by Puneet Bawa
DOCX
A firewall is a network security device.
PPT
Chapter_Five[1].ppt
PPT
Net Defender
PDF
Ch20 book
PPTX
Firewalls
PPT
Netdefender
Day4
Chapter_1_Introduction to Network Security-1.pptx
Ch13 Protecting Networks with Security Devices
Network security
firrewall and intrusion prevention system.pptx
Network security
Firewall presentation
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Cyber security tutorial2
Firewalls by Puneet Bawa
A firewall is a network security device.
Chapter_Five[1].ppt
Net Defender
Ch20 book
Firewalls
Netdefender

More from Information Technology (20)

PDF
Sql Server Security Best Practices
PPT
PPT
SQL 2005 Disk IO Performance
PPT
PPT
Review of SQL
PPT
Sql 2005 high availability
PPT
IIS 7: The Administrator’s Guide
PPT
MOSS 2007 Deployment Fundamentals -Part2
PPT
MOSS 2007 Deployment Fundamentals -Part1
PPT
Clustering and High Availability
PDF
F5 beyond load balancer (nov 2009)
PPT
WSS 3.0 & SharePoint 2007
PPT
SharePoint Topology
PDF
Sharepoint Deployments
PPT
Microsoft Clustering
PDF
Scalable Internet Servers and Load Balancing
PPT
PPT
Migration from ASP to ASP.NET
PPT
Internet Traffic Monitoring and Analysis
Sql Server Security Best Practices
SQL 2005 Disk IO Performance
Review of SQL
Sql 2005 high availability
IIS 7: The Administrator’s Guide
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part1
Clustering and High Availability
F5 beyond load balancer (nov 2009)
WSS 3.0 & SharePoint 2007
SharePoint Topology
Sharepoint Deployments
Microsoft Clustering
Scalable Internet Servers and Load Balancing
Migration from ASP to ASP.NET
Internet Traffic Monitoring and Analysis

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Institutional Correction lecture only . . .
PPTX
Cell Structure & Organelles in detailed.
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Classroom Observation Tools for Teachers
PDF
01-Introduction-to-Information-Management.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Computing-Curriculum for Schools in Ghana
Cell Types and Its function , kingdom of life
2.FourierTransform-ShortQuestionswithAnswers.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Institutional Correction lecture only . . .
Cell Structure & Organelles in detailed.
GDM (1) (1).pptx small presentation for students
Supply Chain Operations Speaking Notes -ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Basic Mud Logging Guide for educational purpose
O5-L3 Freight Transport Ops (International) V1.pdf
Complications of Minimal Access Surgery at WLH
Classroom Observation Tools for Teachers
01-Introduction-to-Information-Management.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Microbial diseases, their pathogenesis and prophylaxis
Computing-Curriculum for Schools in Ghana

Ch05 Network Defenses

  • 1. Chapter 5 Network Defenses
  • 2. Objectives Explain how to enhance security through network design Define network address translation and network access control List the different types of network security devices and explain how they can be used
  • 3.  
  • 4. Security through Network Design Subnetting IP addresses are actually two addresses: one part is a network address and one part is a host address Subnetting or subnet addressing Splits a large block of IP addresses into smaller groups
  • 5. Image from Cisco CCNA Class 1
  • 6. Subnetting at CCSF Image from Cisco CCNA class 1, modified Whole College: 147.144.0.0 /16 147.144.0.1 through 147.144.255.254 CNIT Dept: 147.144.20.0 /24 147.144.20.1 through 147.144.20.254 Eng Dept: 147.144.51.0 /24 147.144.51.1 through 147.144.51.254
  • 8. Subnets Improve Security Each subnet can be isolated from the rest of the network Traffic between subnets can be monitored and restricted at the routers Subnets also allow network administrators to hide the internal network layout Outsiders only see your public servers, not your private subnets
  • 9. Virtual Local Area Network (VLAN) VLANs segment a network with switches, not routers A VLAN allows scattered users to be logically grouped together even though they may be attached to different switches Can reduce network traffic and provide a degree of security similar to subnetting: VLANs can be isolated so that sensitive data is transmitted only to members of the VLAN
  • 10.  
  • 11. Accounting machines are on their own VLAN
  • 12. VLAN Security VLAN communication can take place in two ways All devices are connected to the same switch Traffic is handled by the switch itself Devices are connected to different switches A special “tagging” protocol must be used, such as the IEEE 802.1Q-2005 A VLAN is heavily dependent upon the switch for correctly directing packets Attackers could take control of the switch itself, if it has a default or weak password Specially crafted traffic can also "hop" from one VLAN to another
  • 13. Network Convergence Telephone, data, and video all using the same IP network Voice over IP, Video over IP Advantages Cost savings Management Application development Infrastructure requirements Reduced regulatory requirements Increased user productivity
  • 15. Demilitarized Zone (DMZ) A separate network that sits outside the secure network perimeter Outside users can access the DMZ but cannot enter the secure network
  • 16. DMZ with One Firewall
  • 17. DMZ with Two Firewalls
  • 18. Network Address Translation (NAT) Hides the IP addresses of network devices from attackers Private addresses IP addresses not assigned to any specific user or organization Function as regular IP addresses on an internal network Non-routable addresses--traffic addressed to private addresses is discarded by Internet routers
  • 19. Network Address Translation (NAT) NAT removes the private IP address from the sender’s packet And replaces it with an alias IP address When a packet is returned to NAT, the process is reversed An attacker who captures the packet on the Internet cannot determine the actual IP address of the sender
  • 20. Network Address Translation (NAT) Private IP Addresses Address Translation 192.168.1.101 -> 147.144.1.101 192.168.1.102 -> 147.144.1.102 192.168.1.103 -> 147.144.1.103 192.168.1.151 -> 147.144.1.104 Public IP Addresses
  • 21. Port Address Translation (PAT) Normally performed along with NAT Each packet is given the same IP address but a different TCP port number Allows many machines to share the same public IP address
  • 22. NAT with PAT Web browser: 192.168.1.101 Port 1100 Email: 192.168.1.101 Port 1102 Web browser: 192.168.1.103 Port 1100 Address Translation 192.168.1.101 Port 1100 -> 147.144.1.1 Port 2100 192.168.1.101 Port 1102 -> 147.144.1.1 Port 2101 192.168.1.103 Port 1100 -> 147.144.1.1 Port 2102
  • 23. Network Access Control (NAC) Examines a computer before it is allowed to connect to the network Each computer must meet security policy first, such as Windows patches up to date Antivirus software Antispyware software Etc. Any device that does not meet the policy is only allowed to connect to a “quarantine” network where the security deficiencies are corrected
  • 24.  
  • 25.  
  • 26. Network Security Devices Firewalls Proxy servers Honeypots Network intrusion detection systems Host and network intrusion prevention systems Protocol analyzers Internet content filters Integrated network security hardware
  • 27. Firewall Typically used to filter packets Sometimes called a packet filter Designed to prevent malicious packets from entering the network A firewall can be software-based or hardware-based Hardware firewalls usually are located outside the network security perimeter As the first line of defense
  • 29. Firewall (continued) The basis of a firewall is a rule base Establishes what action the firewall should take when it receives a packet (allow, block, and prompt) Stateless packet filtering Looks at the incoming packet and permits or denies it based strictly on the rule base Stateful packet filtering Keeps a record of the state of a connection between an internal computer and an external server Then makes decisions based on the connection as well as the rule base
  • 31. Stateful Firewall Rules Note error in textbook in left column, 3 rd row State = Established
  • 32. Inbound and Outbound Traffic Filtering Most personal software firewalls today also filter outbound traffic as well as inbound traffic Filtering outbound traffic protects users by preventing malware from connecting to other computers and spreading But it annoys them with these alerts
  • 33. Proxy Server I want to see yahoo.com I will get yahoo.com and save a copy Internet Here is my copy of yahoo.com
  • 34. Proxy Server Clients never directly connect to the Internet This saves bandwidth, because one copy of a popular Web page can be used many times Allows a company to block forbidden Web sites It also prevents many attacks the same way NAT does Reverse proxy Does not serve clients but instead routes incoming requests to the correct server
  • 35. Reverse Proxy Connect to Web server 1
  • 36. Honeypot Intended to trap or trick attackers A computer typically located in a DMZ that is loaded with software and data files that appear to be authentic Yet they are actually imitations of real data files Three primary purposes of a honeypot: Deflect attention Early warnings of new attacks Examine attacker techniques
  • 37. Network Intrusion Detection Systems (NIDS) Network intrusion detection system (NIDS) Watches for attempts to penetrate a network NIDS work on the principle of comparing new behavior against normal or acceptable behavior A NIDS looks for suspicious patterns Passive intrusion detection just logs the traffic and sends alerts
  • 38. Network Intrusion Detection Systems (NIDS) (continued)
  • 39. Intrusion Prevention Systems Finds malicious traffic and deals with it immediately Also called Active Intrusion Detection A typical IPS response may be to block all incoming traffic on a specific port
  • 40. Host Intrusion Prevention Systems (HIPS) Installed on each system that needs to be protected Rely on agents installed directly on the system being protected Work closely with the operating system, monitoring and intercepting requests in order to prevent attacks
  • 41. Host Intrusion Prevention Systems (HIPS) Most HIPS monitor the following desktop functions: System calls File system access System Registry settings Host input/output HIPS are designed to integrate with existing antivirus, anti-spyware, and firewalls HIPS provide an additional level of security that is proactive instead of reactive
  • 42. Network Intrusion Prevention Systems (NIPS) Work to protect the entire network and all devices that are connected to it By monitoring network traffic NIPS can immediately react to block a malicious attack NIPS are special-purpose hardware platforms that analyze, detect, and react to security-related events Can drop malicious traffic based on their configuration or security policy
  • 43. Protocol Analyzers Three ways for detecting a potential intrusion Detecting statistical anomalies (unusual traffic) Examine network traffic and look for well-known patterns of attack Use protocol analyzer technology Protocol analyzers Can fully decode application-layer network protocols Parts of the protocol can be analyzed for any suspicious behavior Such as an overly long User-Agent field in an HTTP GET request
  • 44. Internet Content Filters Internet content filters Monitor Internet traffic and block access to preselected Web sites and files A requested Web page is only displayed if it complies with the specified filters Unapproved Web sites can be restricted based on the Uniform Resource Locator (URL) or by matching keywords
  • 46. Integrated Network Security Hardware Types of hardware security appliances: Dedicated security appliances provide a single security service Multipurpose security appliances that provide multiple security functions Integrated network security hardware Combines or integrates multipurpose security appliances with a traditional network device such as a switch or router Particularly attractive for networks that use IDS