Unit6 Security
Unit6 Security
Unit6 Security
Subject code:310247
Unit VI Security
• Privacy: Privacy means both the sender and the receiver expects confidentiality. The transmitted message
should be sent only to the intended receiver while the message should be opaque for other users. Only the
sender and receiver should be able to understand the transmitted message as eavesdroppers can intercept the
message. Therefore, there is a requirement to encrypt the message so that the message cannot be intercepted.
This aspect of confidentiality is commonly used to achieve secure communication.
• Message Integrity: Data integrity means that the data must arrive at the receiver exactly as it was sent. There
must be no changes in the data content during transmission, either maliciously or accident, in a transit. As
there are more and more monetary exchanges over the internet, data integrity is more crucial. The data
integrity must be preserved for secure communication.
Unit VI Security
Introduction to Computer Security
• End-Point Authentication: Authentication means that the receiver is sure of the sender’s
identity, i.e., no imposter has sent the message.
• Non-Repudiation: Non-Repudiation means that the receiver must be able to prove that
the received message has come from a specific sender. The sender must not deny sending
a message that he or she send. The burden of proving the identity falls on the receiver.
For example, if a customer sends a request to transfer the money from one account to
another account, then the bank must have a proof that the customer has requested for the
transaction.
Unit VI Security
Security Services
• Network security can provide the following services related to a message and entity.
1. Message confidentiality
• It means that the content of a message when transmitted across a network must remain
confidential, i.e. only the intended receiver and no one else should be able to read the message.
• The users; therefore, want to encrypt the message they send so that an eavesdropper on the
network will not be able to read the contents of the message.
Unit VI Security
Security Services
2. Message Integrity
• It means the data must reach the destination without any alterations/modifications
• There must be no changes during transmission, neither accidentally nor
maliciously.
• Integrity of a message is ensured by attaching a checksum to the message.
• The algorithm for generating the checksum ensures that an intruder cannot alter the
checksum or the message.
Unit VI Security
Security Services
3.Message Authentication
• In message authentication the receiver needs to be .sure of the sender’s identity i.e. the receiver has to make sure
that the actual sender is the same as claimed to be.
• There are different methods to check the genuineness of the sender :
1. The two parties share a common secret code word. A party is required to show the secret code word to the
other for authentication.
2. Authentication can be done by sending digital signature.
3. A trusted third party verifies the authenticity. One such way is to use digital certificates issued by a
recognized certification authority.
4. Message non-repudiation
• Non-repudiation means that a sender must not be able to deny sending a message that it actually sent.
• The burden of proof falls on the receiver.
• Non-repudiation is not only in respect of the ownership of the message; the receiver must prove that the
contents of the message are also the same as the sender sent.
• Non-repudiation is achieved by authentication and integrity mechanisms.
5. Entity Authentication
• In entity authentication (or user identification) the entity or user is verified prior to access to the system
resources .
Unit VI Security
Need of Security Services
• The most basic example of Network Security is password protection where the user of the network
oneself chooses
• The network security solutions protect various vulnerabilities of the computer systems such as:
1. Users
2. Locations
3. Data
4. Devices
5. Applications
• There are many layers to consider when addressing network security across an organization. Attacks
can happen at any layer in the network security layers model, so your network security hardware,
software and policies must be designed to address each area.
• Network security typically consists of three different controls: physical, technical and administrative.
These are explained as
▪ Physical Network Security
❖ Physical security controls are designed to prevent unauthorized personnel from gaining physical
access to network components such as routers, cabling cupboards and so on. Controlled access,
such as locks, biometric authentication and other devices, is essential in any organization.
Unit VI Security
Need of Security Services
▪ Technical Network Security
❖ Technical security controls protect data that is stored on the network or which is in transit across,
into or out of the network. Protection is twofold; it needs to protect data and systems from
unauthorized personnel, and it also needs to protect against malicious activities from employees.
▪ Administrative Network Security
❖ Administrative security controls consist of security policies and processes that control user
behavior, including how users are authenticated, their level of access and also how IT staff
members implement changes to the infrastructure
Firewall Protection
• Firewalls, as their name suggests, act as a barrier between the untrusted external networks and your
trusted internal network.
• Administrators typically configure a set of defined rules that blocks or permits traffic onto the network.
Unit VI Security
Need of Security Services
Types of Network Security:
Virtual Private Networks
• Virtual Private Networks (VPNs) creates a connection to the network from another endpoint or site.
For example, users working from home would typically connect to the organization's network over a
VPN. Data between the two points is encrypted and the user would need to authenticate to allow
communication between their device and the network
Unit VI Security
Key Principles of Security
• The protection afforded to an automated information system in order to attain the applicable
objectives of preserving the integrity, availability, and confidentiality of information system
resources (includes hardware, software, firmware, information/ data, and telecommunications).
• This definition of security introduces three key objectives that are at the heart of computer
security:
• Confidentiality: This term covers two related concepts:
• Data confidentiality: Assures that private or confidential information is not made
available or disclosed to unauthorized individuals.
• Privacy: Assures that individuals control or influence what information related to them
may be collected and stored and by whom and to whom that information may be
disclosed.
• Integrity: This term covers two related concepts:
• Data integrity: Assures that information and programs are changed only in a specified
and authorized manner.
• System integrity: Assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation of the system.
• Availability: Assures that systems work promptly and service is not denied to authorized users.
• These concepts form what is often referred to as the CIA triad
Unit VI Security
Threats and Vulnerabilities
• Threat: A potential for violation of security, which exists when there is a circumstance, capability,
action, or event that could breach security and cause harm. That is, a threat is a possible danger that
might exploit a vulnerability.
• A threat/vulnerability is a potential violation of security.
• Flaws in design, implementation, and operation.
• An attack is any action that violates security.
• Active adversary (actively/continuously getting information)
• An attack has an implicit concept of “intent”
• Router mis-configuration or server crash can also cause loss of availability, but they are not
attacks
• Vulnerabilities occur due to Hardware, Software, Network and Procedural vulnerabilities.
1. Hardware Vulnerability:
A hardware vulnerability is a weakness which can used to attack the system hardware through physically or remotely. For Eg:
1. Old version of systems or devices
2. Unprotected storage
3. Unencrypted devices, etc.
Unit VI Security
Threats and Vulnerabilities
2. Software Vulnerability:
A software error happen in development or configuration such as the execution of it can violate the security policy. For
examples:
1. Lack of input validation
2. Unverified uploads
3. Cross-site scripting
4. Unencrypted data, etc.
3. Network Vulnerability:
A weakness happen in network which can be hardware or software. For examples:
5. Unprotected communication
6. Malware or malicious software (e.g.: Viruses, Keyloggers, Worms, etc)
7. Social engineering attacks
8. Misconfigured firewalls
4. Procedural Vulnerability:
A weakness happen in an organization operational methods. For examples:
9. Password procedure – Password should follow the standard password policy.
10. Training procedure – Employees must know which actions should be taken and what to do to handle the
security.
Unit VI Security
Types of attacks
• Active
Unit VI Security
Types of attacks
Active Attacks:
• An Active attack attempts to alter system resources or effect their operations. Active
attack involves some modification of the data stream or creation of false statement. Types
of active attacks are as following:
1. Masquerade • Masquerade attack takes place when one entity pretends to be different
entity. A Masquerade attack involves one of the other form of active attacks.
Unit VI Security
Types of attacks
2. Modification of Messages
• It means that some portion of a message is altered or that message is delayed or
reordered to produce an unauthorized effect. For example, a message meaning “Allow
JOHN to read confidential file X” is modified as “Allow Smith to read confidential file
X”.
Modifies the message
and sends to Johns
3. Repudiation
• This attack is done by either sender or receiver. The sender or receiver can deny later that
he/she has send or receive a message. For example, customer ask his Bank “To transfer an
amount to someone” and later on the sender(customer) denies that he had made such a
request. This is repudiation.
Unit VI Security
Types of attacks
4. Replay
• It involves the passive capture of a message and its subsequent the transmission to produce
an authorized effect.
5. Denial of Service
• It prevents normal use of communication facilities. This attack may have a specific
target. For example, an entity may suppress all messages directed to a particular
destination. Another form of service denial is the disruption of an entire network wither by
disabling the network or by overloading it by messages so as to degrade performance.
Unit VI Security
Types of attacks
• Passive attacks: A Passive attack attempts to learn or make use of information from the
system but does not affect system resources.
• Passive Attacks are in the nature of eavesdropping on or monitoring of transmission.
The goal of the opponent is to obtain information that is being transmitted.
• Types of Passive attacks are as following:
1. The release of message content –
Telephonic conversation, an electronic mail message, or a transferred file may contain
sensitive or confidential information. We would like to prevent an opponent from
learning the contents of these transmissions.
Unit VI Security
Types of attacks
2. Traffic analysis –
• Suppose that we had a way of masking (encryption) information, so that the attacker
even if it captures the message, it cannot extract any information from the message.
• The opponent could determine the location and identity of communicating host and
could observe the frequency and length of messages being exchanged.
• This information might be useful in guessing the nature of the communication that was
taking place.
Unit VI Security
ITU-T X.800 Security Architecture For OSI
• The OSI security architecture focuses on security attack, mechanism, and services. These
can be defined briefly as follows:
▪ Security Attack: Any action that compromises the security of information owned by an
organization.
▪ Security Mechanism: A process that is designed to detect, prevent or recover from a security
attack. And security mechanism is a method which is used to protect your message from
unauthorized entity.
▪ Security Services: Security Services is the services to implement security policies and
implemented by security mechanism.
Unit VI Security
ITU-T X.800 Security Architecture For OSI
• X.800 defines a security service, which ensures adequate security of the systems or
of data transfers
• X.800 Recommendation divides security services into 5 categories:
▪ Authentication
▪ Access control
▪ Data confidentiality
▪ Data integrity
▪ Nonrepudiation
▪ Availability service
Unit VI Security
ITU-T X.800 Security Architecture For OSI
• DATA CONFIDENTIALITY
• The protection of data from unauthorized disclosure.
▪ Connection Confidentiality
• The protection of all user data on a connection.
▪ Connectionless Confidentiality
• The protection of all user data in a single data block
▪ Selective-Field Confidentiality
• The confidentiality of selected fields within the user data on a connection or in a single data block.
▪ Traffic-Flow Confidentiality
• The protection of the information that might be derived from observation of traffic flows.
Unit VI Security
ITU-T X.800 Security Architecture For OSI
• DATA INTEGRITY
• The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification,
insertion, deletion, or replay).
• Connection Integrity with Recovery
▪ Provides for the integrity of all user data on a connection and detects any modification, insertion,
deletion, or replay of any data within an entire data sequence, with recovery attempted.
• Connection Integrity without Recovery
▪ As above, but provides only detection without recovery.
• Selective-Field Connection Integrity
▪ Provides for the integrity of selected fields within the user data of a data block transferred over a
connection and takes the form of determination of whether the selected fields have been modified,
inserted, deleted, or replayed.
• Connectionless Integrity
▪ Provides for the integrity of a single connectionless data block and may take the form of detection
of data modification. Additionally, a limited form of replay detection may be provided.
• Selective-Field Connectionless Integrity
▪ Provides for the integrity of selected fields within a single connectionless data block; takes the form
of determination of whether the selected fields have been modified.
Unit VI Security
ITU-T X.800 Security Architecture For OSI
• NONREPUDIATION
• Provides protection against denial by one of the entities involved in a communication of
having participated in all or part of the communication.
• Nonrepudiation, Origin
• Proof that the message was sent by the specified party.
• Nonrepudiation, Destination
• Proof that the message was received by the specified party
• Example: Imagine a user of online banking who has made a transaction, but later denied
that. How the bank can protect itself in a such situation?
• AVAILABILITY SERVICE
• Protects a system to ensure its availability
• Particularly, it addresses denial-of-service attacks
• Depends on other security services: access control, authentication, etc
Unit VI Security
Security Policy and Mechanisms
• Encipherment
• The use of mathematical algorithms to transform data into a form that is not readable. The transformation and
subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
• Digital Signature
• Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to
prove the source and integrity of the data unit and protect against forgery (e.g., by the recipient).
• Access Control- A variety of mechanisms that enforce access rights to resources.
• Data Integrity - A variety of mechanisms used to assure the integrity of a data unit or stream of data units.
• Authentication Exchange - A mechanism intended to ensure the identity of an entity by means of
information exchange.
• Traffic Padding- The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
• Routing Control - Enables selection of particular physically secure routes for certain data and allows routing
changes, especially when a breach of security is suspected.
• Notarization - The use of a trusted third party to assure certain properties of a data exchange.
Unit VI Security
Operational Model of Network Security
• A Network Security Model exhibits how the security service has been designed over the network to prevent
the opponent from causing a threat to the confidentiality or authenticity of the information that is being
transmitted through the network.
• The network security model presents the two communicating parties sender and receiver who mutually
agrees to exchange the information. The sender has information to share with the receiver.
• But sender cannot send the message on the information channel in the readable form as it will have a threat of
being attacked by the opponent. So, before sending the message through the information channel, it should
be transformed into an unreadable format.
Unit VI Security
Operational Model of Network Security
• The general model shows that there are four basic tasks in designing a particular security
service:
1. Design an algorithm for performing the security-related transformation. The algorithm should be such
that an opponent cannot defeat its purpose.
2. Generate the secret information to be used with the algorithm.
3. Develop methods for the distribution and sharing of the secret information.
4. Specify a protocol to be used by the two principals that makes use of the security algorithm and the
secret information to achieve a particular security service.
Unit VI Security
Operational Model of Network Security
• You are well aware of the attackers who attack your system that is accessible through the
internet. These attackers fall into two categories:
1. Hacker: The one who is only interested in penetrating into your system. They do not
cause any harm to your system they only get satisfied by getting access to your system.
2. Intruders: These attackers intend to do damage to your system or try to obtain the
information from the system which can be used to attain financial gain.
• The attacker can place a logical program on your system through the network which can
affect the software on your system. This leads to two kinds of risks:
a. Information threat: This kind of threats modifies data on the user’s behalf to which
actually user should not access. Like enabling some crucial permission in the system.
b. Service threat: This kind of threat disables the user from accessing data on the
system.
• Well, these kinds of threats can be introduced by launching worms and viruses and may
more like this on your system. Attack with worms and viruses are the software attack that
can be introduced to your system through the internet
Unit VI Security
Operational Model of Network Security
• The network security model to secure your system is shown in the figure below:
• There are two ways to secure your system from attacker of which the first is to introduce
the gatekeeper function. Introducing gatekeeper function means
introducing login-id and passwords which would keep away the unwanted access.
• In case the unwanted user gets access to the system the second way to secure your system is
introducing internal control which would detect the unwanted user trying to access the system by
analyzing system activities. This second method we call as antivirus which we install on our system
to prevent the unwanted user from accessing your computer system through the internet.
Unit VI Security
Symmetric and Asymmetric key Cryptography
• Cryptography is associated with the process of converting ordinary plain text into
cipher text and vice-versa.
• It is a method of storing and transmitting data in a particular form so that only those for
whom it is intended can read and process it.
It only requires a single key for both encryption and decryption. It requires two key one to encrypt and the other one to decrypt.
The size of cipher text is same or smaller than the original plain text. The size of cipher text is same or larger than the original plain text.
It is used when a large amount of data is required to transfer. It is used to transfer small amount of data.
Examples: 3DES, AES, DES and RC4 Examples: Diffie-Hellman, ECC, El Gamal, DSA and RSA
• The popular framework developed for ensuring security at network layer is Internet
Protocol Security (IPSec).
• IP Security (IPSec) is a collection of protocols designed by the Internet Engineering Task
Force (IETF) to provide security for a packet at the network level.
• IPSec helps create authenticated and confidential packets for the IP layer
Unit VI Security
Security in Network-Introduction of IPSec
• IPSec in the transport mode does not protect the IP header; it only protects the
information coming from the transport layer
Unit VI Security
Security in Network-Introduction of IPSec
Comparison
• In transport mode, the IPSec layer comes between the transport layer and the network layer.
• In tunnel mode, the flow is from the network layer to the IPSec layer and then back to the network layer again
• Figure 32.5 compares the two modes
Unit VI Security
Security in Transport-SSL
• Two protocols are dominant today for providing security at the transport layer: the Secure
Sockets Layer (SSL) protocol and the Transport Layer Security (TLS) protocol.
Unit VI Security
Security in Transport-SSL
• SSL is designed to provide security and compression services to data generated from the application layer.
• SSL provides security to the data that is transferred between web browser and server.
• Typically, SSL can receive data from any application-layer protocol, but usually the protocol is HTTP.
• The data received from the application is compressed (optional), signed, and encrypted. The data is then passed to a
reliable transport-layer protocol such as TCP.
• The family includes SSL versions 2 and 3 and TLS protocol. SSLv2 has been now replaced by SSLv3, so we will focus on
SSL v3 and TLS.
Services
• SSL provides several services on data received from the application layer.
• ❑ Fragmentation. First, SSL divides the data into blocks of 214 bytes or less.
• ❑ Compression. Each fragment of data is compressed using one of the lossless compression methods negotiated
between the client and server. This service is optional.
• ❑ Message Integrity. To preserve the integrity of data, SSL uses a keyed-hash function to create a MAC.
• ❑ Confidentiality. To provide confidentiality, the original data and the MAC are encrypted using symmetric-key
cryptography.
• ❑ Framing. A header is added to the encrypted payload. The payload is then passed to a reliable transport-layer
protocol.
Unit VI Security
Security in Transport-SSL
Handshake Protocol
• The Handshake Protocol uses messages to negotiate the cipher suite, to
authenticate the server to the client and the client to the server if needed,
and to exchange information for building the cryptographic secrets.
• The handshaking is done in four phases
Phase I: Establishing Security Capabilities
• In Phase I, the client and the server announce their security capabilities and
choose those that are convenient for both.
• In this phase, a session ID is established and the cipher suite is chosen.
• The parties agree upon a particular compression method.
• After Phase I, the client and server know the version of SSL, the
cryptographic algorithms, the compression method, and the two random
numbers for key generation.
Phase II: Server Authentication and Key Exchange
• In Phase II, the server authenticates itself if needed. After Phase II, the
server is authenticated to the client, and the client knows the public key of
the server if required.
Unit VI Security
Security in Transport-SSL
Handshake Protocol
• Phase III: Client Authentication and Key Exchange
• Phase III is designed to authenticate the client. After Phase III, the client
is authenticated for the server, and both the client and the server know
the pre-master secret.
Advantages of HTTPS
• Following are the advantages or benefits of a Hypertext Transfer Protocol Secure (HTTPS):
• The main advantage of HTTPS is that it provides high security to users.
• Data and information are protected. So, it ensures data protection.
• SSL technology in HTTPS protects the data from third-party or hackers. And this technology builds
trust for the users who are using it.
• It helps users by performing banking transactions.
Disadvantages of HTTPS
• Following are the disadvantages or limitations of a Hypertext Transfer Protocol Secure (HTTPS):
• The big disadvantage of HTTPS is that users need to purchase the SSL certificate.
• The speed of accessing the website is slow because there are various complexities in
communication.
• Users need to update all their internal links.
Unit VI Security
Review of MIME from Unit V
• Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of
email to support:
• Virtually all human-written Internet email and a fairly large proportion of automated email is
transmitted via SMTP in MIME format.
• Content-Type This header indicates the Internet media type of the message content, consisting of a
type and subtype
• MIME-Version The presence of this header indicates the message is MIME-formatted. The value is
typically "1.0" so this header appears as MIME-Version: 1.0
Unit V Security
Review of MIME from Unit V
• MIME, a specification for formatting non-ASCII messages so that they can be sent over the Internet.
• Many e-mail clients now support MIME, which enables them to send and receive graphics, audio,
and video files via the Internet mail system.
• In addition, MIME supports messages in character sets other than ASCII.
• There are many predefined MIME types, such as GIF graphics files and PostScript files. It is also
possible to define your own MIME types.
• In addition to e-mail applications, Web browsers also support various MIME types. This enables the
browser to display or output files that are not in HTML format.
• MIME is an extension of the original Internet e-mail protocol that lets people use the protocol to
exchange different kinds of data files on the Internet: audio, video, images, application programs, and
other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport
Protocol (SMTP).
Unit VI Security
Security in Application - S/MIME
• In e-mail security, the sender of the message needs to include the name or
identifiers of the algorithms used in the message.
• It is obvious that some public-key algorithms must be used for e-mail security
• In e-mail security, the encryption/decryption is done using a symmetric-key
algorithm, but the secret key to decrypt the message is encrypted with the
public key of the receiver and is sent with the message.
Unit VI Security
Security in Application - S/MIME
• S/MIME stands for Secure Multipurpose Internet Mail Extension security service designed for
electronic mail.
• It is based on an earlier non-secure e-mailing standard called MIME.
• The protocol is an enhancement of the Multipurpose Internet Mail Extension (MIME) protocol.
Working of S/MIME
• S/MIME approach is similar to PGP. It also uses public key cryptography, symmetric key cryptography,
hash functions, and digital signatures. It provides similar security services as PGP for e-mail
communication.
• The most common symmetric ciphers used in S/MIME are RC2 and TripleDES. The usual public key
method is RSA, and the hashing algorithm is SHA-1 or MD5.
• The whole MIME entity is encrypted and packed into an object. S/MIME has standardized cryptographic
message formats (different from PGP). In fact, MIME is extended with some keywords to identify the
encrypted and/or signed parts in the message.
• S/MIME relies on X.509 certificates for public key distribution.
Unit VI Security
Security in Application - S/MIME
Benefits of S/MIME
• No repudiation: The sender cannot deny having sent the email and its contents. A digital signature is proof that
the email has come from the signer’s email client.
• Protection from in-transit email corruption: No cybercriminal can insert any sort of malicious software such
as viruses, spyware, trojan horses, computer worms, rootkit, etc. while the email is in transit.
• Protection from email spoofing: Digital signature protects the email recipients from email spoofing. No one
can impersonate the digital signature of the company’s official staff members. So, no one can trick the
recipients by sending spoofed emails impersonating the business’s authentic emails. (Or if they try, they’ll be
lacking a signature.)
• Warns recipients: If someone has tampered with the email or digital signature, it immediately alerts the
recipients about the risk. So, the recipients know that something is fishy about the email and can protect
themselves from becoming victims of the cyberattack before it’s too late.
• Prevents data leaks: An S/MIME certificate protects data from eavesdropping and leakage. The company’s
confidential communications with internal and external stakeholders remain secured due
to the encryption functionality.
Unit VI Security
Security in Application - S/MIME
• Decryption process
1. The recipient receives the email.
2. The encrypted message is retrieved.
3. The recipient's private key is used to decrypt the encrypted message.
4. The original message is obtained and displayed to the recipient.
Unit VI Security
Security in Application - S/MIME
• Digital Signature
• Why is it needed?
• S/MIME digitally signs emails in order to validate the sender. Digital Signature provides the following advantages:
• Sender Validation - Digital signatures are unique to each user. Thus, it allows the recipient to verify if the email is
actually sent by the person who it appears from. This eliminates the risk of anyone spoofing of your email address.
• Nonrepudiation - The uniqueness of the digital signature ensures that the author of the email will not be able to deny
ownership of the emails. Claims of impersonation can easily be refuted.
• How does it work?
• The process starts with the sender and receiver possessing each other's public key. Digital signing of an email works as
follows:
• Digital signing process
1. Once the sender clicks on Send, the original message is captured.
2. The message hash is calculated.
3. The sender's private key is used to encrypt the hash value.
4. The encrypted hash value is added to the email.
5. The email is sent to the recipient.
Unit VI Security
Security in Application - S/MIME
• An intrusion detection system (IDS) is a device or software application that monitors a network
for malicious activity or policy violations.
• Any malicious activity or violation is typically reported or collected centrally using a security
information and event management system.
• Some IDS’s are capable of responding to detected intrusion upon discovery. These are classified
as intrusion prevention systems (IPS).
• IDS Detection Types
• There is a wide array of IDS, ranging from antivirus software to tiered monitoring systems that
follow the traffic of an entire network. The most common classifications are:
• Network intrusion detection systems (NIDS): A system that analyzes incoming network
traffic.
• Host-based intrusion detection systems (HIDS): A system that monitors important operating
system files.
Unit VI Security
Overview of IDS
• There is also subset of IDS types. The most common variants are based on signature
detection and anomaly detection.
• Signature-based: Signature-based IDS detects possible threats by looking for specific
patterns, such as byte sequences in network traffic, or known malicious instruction
sequences used by malware. This terminology originates from antivirus software, which
refers to these detected patterns as signatures. Although signature-based IDS can easily
detect known attacks, it is impossible to detect new attacks, for which no pattern is
available.
• Anomaly-based: a newer technology designed to detect and adapt to unknown attacks,
primarily due to the explosion of malware. This detection method uses machine learning to
create a defined model of trustworthy activity, and then compare new behavior against this
trust model. While this approach enables the detection of previously unknown attacks, it
can suffer from false positives: previously unknown legitimate activity can accidentally be
classified as malicious.
Unit VI Security
Overview of IDS
IDS Usage in Networks
• When placed at a strategic point or places within a network to monitor traffic to and from all devices on the network,
an IDS will perform an analysis of passing traffic, and passes the information to the library of known attacks. Once an
attack is identified, or abnormal behavior is sensed, the alert can be sent to the administrator.
• Evasion Techniques- Being aware of the techniques available to cyber criminals who are trying to breach a secure
network can help IT departments understand how IDS systems can be tricked into not missing actionable threats:
• Fragmentation: Sending fragmented packets allow the attacker to stay under the radar, bypassing the detection
system's ability to detect the attack signature.
• Avoiding defaults: A port utilized by a protocol does not always provide an indication to the protocol that’s
being transported. If an attacker had reconfigured it to use a different port, the IDS may not be able to detect the
presence of a trojan.
• Coordinated, low-bandwidth attacks: coordinating a scan among numerous attackers, or even allocating
various ports or hosts to different attackers. This makes it difficult for the IDS to correlate the captured packets
and deduce that a network scan is in progress.
• Address spoofing/proxying: attackers can obscure the source of the attack by using poorly secured or
incorrectly configured proxy servers to bounce an attack. If the source is spoofed and bounced by a server, it
makes it very difficult to detect.
• Pattern change evasion: IDS rely on pattern matching to detect attacks. By making slight adjust to the attack
architecture, detection can be avoided.
Unit VI Security
Overview of IDS
Limitations of Firewalls
• Firewalls cannot stop users from accessing malicious websites, making it vulnerable to
internal threats or attacks.
• Firewalls cannot protect against the transfer of virus-infected files or software.
• Firewalls cannot prevent misuse of passwords.
• Firewalls cannot protect if security rules are misconfigured.
• Firewalls cannot protect against non-technical security risks, such as social engineering.
• Firewalls cannot stop or prevent attackers with modems from dialing in to or out of the
internal network.
• Firewalls cannot secure the system which is already infected.
Unit VI Security
Overview of Firewall
Types of Firewalls
• Packet Filtering Firewalls
• A packet filtering firewall is an essential type of firewall. It facilitates a management program that monitors web traffic and
filters incoming packets based on configured security methods. These firewalls are created to block network traffic IP
protocols, an IP address, and a port number if a data packet does not connect to the established rule-set.
• Application Level Gateway Firewall
• It is also known as Proxy Firewalls. Proxies are mainly used to control or monitor outbound traffic. Some application
proxies cache the data requested. This lower bandwidth requirement decreases the access time for the following user to
access the same data. It also gives unquestionable evidence of what was transferred.
• Circuit-level Gateways
• Circuit-level gateways are another type of firewall that can easily configure to allow or block traffic without significant
computing resources. These types of firewalls typically operate at the OSI model’s session-level by verifying TCP
(Transmission Control Protocol) connections and sessions. Circuit-level gateways are designed to ensure that the regular
sessions are protected.
Unit VI Security
Overview of Firewall
Types of Firewalls (Contd…)
• Next-Generation Firewalls (NGFW)
• These work by filtering traffic, network that is specified by the applications or traffic methods and the ports they are created.
• Stateful Multi-Layer Inspection (SMLI) Firewalls
• Stateful multilayer inspection firewalls contain both packet inspection technology and TCP handshake verification. It can
create SMLI firewalls better than packet-filtering firewalls or circuit-level gateways. These types of firewalls keep track of the
status of established connections.
• Network address translation (NAT) Firewalls
• It allows multiple devices with independent network addresses to connect to the internet using a single IP address, keeping
individual IP addresses hidden.
• Threat-focused NGFW
• Threat-focused NGFW contains all the features of a traditional NGFW. They can also support advanced threat detection and
remediation. These types of firewalls can react against attacks quickly.
• Cloud Firewalls
• Whenever a firewall is created using a cloud solution, it is called a cloud firewall or FaaS (firewall-as-service). Cloud firewalls
are supported and run on the Internet by third-party vendors.