Problems Example: All These Example Are Real Cases

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

Problems Example

All these example are real cases


1- A trainee sniffs the network and gets all mailboxes passwords
2- A subcontractor shuts down all the 300 WNT servers with a denial of service attack(DoS)
3- Employees go on strike after looking at their colleagues benefits on the web site of a subsidiary
in another country
4- Someone hacked the bank wire transfers of a corporate database server
5- A cooperative partner on the on the development of version N of a product, steals the
specifications of version N+1 of the product on hundreds of application servers
Solution

What folks might suggest initially

 A trainee sniffs the network and gets all mailboxes passwords


1. Move to a full switched network and avoid network sniffing
 A subcontractor shuts down all the 300 WNT serves with a DoS
2. Secure your WNT servers, upgrade WNT, apply hot-fixes
 Employees look at web site of a subsidiary in another country
3. Add user authentication and access control on the company web server (100+) and subsidiaries
(30+)
 Someone hacked the bank wire transfers
4. Cut off the connection from internal network to the database server (it remains connected to
the bank)
 A cooperative partner steals the specification of version N+1
5. Add stronger user access-security at the operating system layer on all servers
What the analysis shows up:
 A trainee sniffs the network and gets all mailboxes password
1. The trainee doesn’t need access to the mail server
 A subcontractor shuts down all the 300 WNT server with a DoS
2. The subcontractor needed access to only 6 WNT server to perform his job
 Employees look at web site of a subsidiary in another country
3. Employees of one country didn’t need access to the others countries subsidiaries web server
 Someone hacked the bank wire transfer
4. Nobody needed to be able to connect from the place where the hacker was to the database
server
 A cooperative partner steals the specifications of version N+1
5. The cooperative partner should not have access to that part of the database
Class
 IP addresses can be
 Domains(s)
 Class(es)

 Class
 Grouping of IP addresses, groups of sources or destinations
 Within a domain
 Across daomians
 Network, sub-network, ranges, lists
 Static or dynamic
 A Group is the grouping of users
 A set is the grouping of protocols or services
Does Network partitioning satisfy everyone

 Network partitioning makes network managers & NOC (Network Operations Center)
unhappy in most cases
 They don’t want filters on network devices
 They don’t want to worry about security
 They are afraid of the move to user-based security at the network layer
 Network managers & NOC must adapt
 They must support QoS, id flow selection, idaccess-lists
 QoS ACLs are much more complex than just allow/deny
 Network manager & NOC already know ACLs
 Routing ACLs
 Existing IP filtering
Domain
 A domain is a piece of the network
 Set of sub networks
 LAN(s) or WAN(s)
 Virtual network (VLAN)
 Host(s)
 Mostly static
 The policy will be enforced between domains
 There is no policy enforcement within a domain
Future of network partitioning

 X.509 certificates to replace IP addresses for device & hosts identification & authentication
 The same as IP sec
 User-based access control
 Filter based on user X.509 certificates
 Using HTTP AAA
 Recall: in existing network devices: at network layer
 How user-based filtering works
 The first network device that a host tries to cross authenticates the user
 The network device applies the user profile
 The user only sees a virtual network with the specific hosts and service he needs access.
Network partitioning & Intrusion Detection System

 IP filtering is proactive security, Intrusion Detection is responsive security


 Several intrusion Detection Methods
 Network-based IDS
 Host-based IDS
 Application-based IDS
 Host-based & Application-based IDS
 As difficult to deploy as proactive host-based security
 Network-based IDS
 Useful for application layer signatures detection
 Going from host into network devices
Limitations of Network partitioning
 IP address based
 Why trust IP addresses?
 LAN security is needed
 DHCP
 Binding IP address to MAC(Ethernet) address
 Becomes complex in large environment
 Meshed networks with large numbers of filtering devices
 When business needs require the set up of many VLANs
 Definition is too complex when many entities have exchanges
 Many branches with different flows between then
 templates can’t be used
 Need for local policy definition within a hierarchical policy definition
Application layer controls
 Network partitioning applies security at the network layer with IP filtering
 IP filtering can go up to application layer controls
 Within the same session with cut-thru proxies
 Many existing filtering devices use application proxies when necessary
 Application layer control you may find
 Commands within a protocol
 GET vs PUT in FTP
 Database SELECT in SQL Net
 Field size in SMTP
 Data type
 Word document, java mobile code, Active X mobile code
 Content-filtering
 Hidden mobile code: JavaScript in HTML, macros in Word, Excel, Etc
 XML Signature
 Virus detection
Performance issues associated with Network Partitioning
 IP filtering performance is still an issue today
 Low cost network devices, low performance, minimum amount of memory
 Poor IP filtering capabilities on low-end routers
 Poor optimization of filtering code in some routers
 IP filtering performance will no longer be issue tomorrow
 Layer 4 filtering on switches, even in routers
 IP filtering is programmed in hardware, ASICs
 Time of datagram treatment is independent of filters length
 Needed for QoS, QoS needed for VoIP

Application layer controls


 Network partitioning applies security at the network layer with IP filtering
 IP filtering can go up to application layer controls
 Within the same session with cut-thru proxies
 Many existing filtering devices use application proxies when necessary
 Application layer control you may find
 Commands within a protocol
 GET vs PUT in FTP
 Database SELECT in SQL Net
 Field size in SMTP
 Data type
 Word document, java mobile code, Active X mobile code
 Content-filtering
 Hidden mobile code: JavaScript in HTML, macros in Word, Excel, Etc
 XML Signature
 Virus detection
Scalability of network partitioning
 Meshed network
 Tabular line/rule oriented tools
 You must have the topology in tour mind
 Limited to ±5 network devices applying security (SPEP)
 Limited to ±70 rules
 Tool with topological global view
 Limited to ±50 network devices applying security (SPEP) without zoom or folding
 No rule limitation
 Example of tabular line/rule oriented view

Security policy enforcement point (SPEP)

 SPEP is a filtering device


 SPEP is any kind of device able to do filtering
 Firewall
 Router
 Switch
 Specific network appliance
 The SPEPs with central management act as distributed firewalls

Typical applications of network partitioning


Internet
Complex perimeter architecture
E-commerce platform
Extranets
Branches networks

VLANs, VPNs & IP sec management


 VLANs
 The configurable logical view of hosts
 Let you set up your business domains
 VPNs
 Network layer: IP sec
 Data linklayer:PPTP,L2TP
 Application layer: PPP over SSH, many proprietary software component

What is network partitioning?


 Dividing internal network into domains
 Application filters between domains using existing network devices
 These network devices have IP filtering devices: security policy enforcement point =
SPEP
 Most network device devices have IP filtering capabilities
 Filtering devices allow only necessary service flows between domains
 Network partitioning is also called network segregation or network compartimentalization

When should network partitioning be used?


 Unclear or unmanageable or porous network perimeter
 Intranet over a WAN using VPN
 VPNs with mobile users
 What security should be on a mobile PC directly connected to the Internet and
within the private network through a VPN?
 VPNs with branches over the Internet
 Modem banks and remote access users
 Extranets
 E-commerce platforms that integrate core business to the internet
 Like layered n-tier architectures
 B-to-B applications that interconnect core business to suppliers
 All need to communicate:
 Mobile users via VPN that updates E-commerce platforms

Why network partitioning instead of others security techiques?

 Network partitining is easier than other techniques


 Distributed security is too complex
 Single-sign-on remains difficult to deploy
 Remote procedure call and existing mobile code make traditional security models
outdated
 Network partitining is a proactive security technique
 Intrusion detection is responsive or monitoring and not as easy and sfficent models
outdated
 Others security techniques are still complementary
 Network partitioning is the natural extansion of the firewall
 The firewall concept is themost popular concept in security
 Network partitining is just the distribution of the firewall concept across an existing
network

Security policy enforcement at Application & OS layer vs. Network layer

Application & OS layer Network layer


Set up security in many application Set up security once for the whole infrastructure
Set up security on many hosts in many ways

Affects many system and application adnimistrators Affects the Network architecture department & the
in many place Network Operation Center

Complex to implement without a tool Complex to implement without a tool

Complex to implement with available tool. Example: Simple to implement with available tool. Example:
Axent ESM solsoft Net partioner

Fragmented, Device-Based vs. Centralized, Policy-Based Network Security


Framented, Device-Based Centralized, Policy-Based

Doesn’t provide scalability Provide scalability with global vision

Difficult to manage Easy to manage

Complexity can lead to security holes Complexity becomes hidden bo policy simplicity

Complexity avoids granularity Simplecity allows granularity

Abstraction level of policy-Based Network Security management


 Policy-based management is a new abstraction Level
 True Policy-based management is not a new marketing idea for network management
 Policy-based management enforrces real business needs over information infrastructure
 Policy-based management is the highest level view, the closest to business needs and
far detailed network management

Authentication
 Network security policy requires authentication of
 Hosts & Network devices
 User
 Hosts & Network device authentication
 Today : only indentification with IP address
 Tomorrow : X.509 cetificate
 Key management with PKI
 Solves the scalability issue of authentication
 The PKI could become the security policy Decision Point
 The network is a Distributed Policy Enforcement Point for the Security Policy
Policies

Many Policies

You might also like