Topics and Sub-Topics: Unit - 4: Firewall & Intrusion Detection System Total Marks-18
Topics and Sub-Topics: Unit - 4: Firewall & Intrusion Detection System Total Marks-18
• When you are connected to the Internet, you are constantly sending and receiving
• The firewall filters these packets to see if they meet certain criteria set by a series
• This way, hackers cannot get inside and steal information such as bank account
1. Packet Filter Firewall: Continue….
1. Packet Filter Firewall:
• Working:-
1. A packet filtering router firewall applies a set of rules to each packet and based on
going in either direction i.e. from the local network to the outside world and vice versa.
b. Pass the packet through a set of rules, based on the contents of the IP and
transport header fields of the packet. If there is a match with one of the set rule,
c. If there is no match with any rule, take the default action. It can be discard all
Step-1: User contacts the application gateway using a TCP/IP application such as
HTTP.
Step-2: The application gateway asks about the remote host with which the user
wants to establish a connection. It also asks for the user id and password that is
required to access the services of the application gateway.
Step-3: After verifying the authenticity of the user, the application gateway accesses
the remote host on behalf of the user to deliver the packets.
4. 1.3 Limitations of Firewall:
1. Complexity: Setting up and keeping up a firewall can be time-consuming and
difficult, especially for bigger networks or companies with a wide variety of
users and devices.
7. Limited VPN support: Some firewalls might not allow complex VPN features
like split tunneling, which could restrict the experience of a remote worker.
host. It can store the company’s web pages which can be served to the outside users.
• Hence, the DMZ can’t give access to the other company’s data. By any way, if an
outsider penetrates the DMZ’s security the web pages may get corrupted but other
company’s information can be safe.
4.3.1 Intrusion Detection System(IDS):
• An IDS (Intrusion detection system) is intrusion detection system is process of
monitoring the events occurring in computer system or network & analyzing
them for signs of possible incident which are threats of computer security.
• Intrusion detection system (IDS) is a device or software application that monitors
network or system activities for malicious activities or policy violations and
produces reports to a management station.
• IDS come in a variety of “flavors” and approach the goal of detecting suspicious
traffic in different ways.
• Figure Intrusion Detection System
4.3.1 Intrusion Detection System(IDS): Continue……
• IDS have following logical components:
4. User Interface & Reporting: interfaces with human element, providing alerts
when suitable & giving the user a means to interact with & operate the IDS.
4.3.1 Intrusion Detection System(IDS): Continue……
• IDS are mainly divided into two categories, depending on monitoring activity:
1) Host-based IDS: Host based IDS looks for certain activities in the log files are:
1. Logins at odd hours
2. Login authentication failure
3. Adding new user account
4. Modification or access of critical systems files.
5. Modification or removal of binary files
6. Starting or stopping processes.
7. Privilege escalation
8. Use of certain program
2) Network based IDS: Network based IDS looks for certain activities like:
1. Denial of service attacks.
2. Port scans or sweeps
3. Malicious contents in the data payload of packet(s)
4. Vulnerability of scanning
5. Trojans, Viruses or worms
6. Tunneling
7. Brute force attacks.
4.3.2 Types of Intrusion Detection System(IDS):
1. Network Intrusion Detection System (NIDS):
• Network intrusion detection systems (NIDS) are set up at a planned point within
the network to examine traffic from all devices on the network.
• It performs an observation of passing traffic on the entire subnet and matches
the traffic that is passed on the subnets to the collection of known attacks. Once
an attack is identified or abnormal behavior is observed, the alert can be sent to
the administrator.
• An example of a NIDS is installing it on the subnet where firewalls are located in
order to see if someone is trying to crack the firewall.
• Figure :NIDS
Network Intrusion Detection System (NIDS):
• Advantages of Network-based Intrusion Detection Systems
• The deployment of network-based IDSs is usually easy with minimal effort.
• Network-based IDSs can be made very secure and is often invisible to most
attackers.
• They can monitor a heterogeneous set of hosts and operating systems
simultaneously, due to the fact that standard network protocols (e.g. TCP, UDP
and IP) are supported and used by most major operating systems.
• Advantages:
1. Operating System specific and detailed signatures.
2. Examine data after it has been decrypted.
3. Application specific.
4. Determine whether or not an alarm may impact that specific.
• Disadvantages:
1. Should have a process on every system to watch.
2. High cost of ownership and maintenance.
3. Uses local system resources.
4. If logged locally, could be compromised or disable.
4.3.3 Vulnerability Assessment:
• A vulnerability assessment is a systematic review of security weaknesses in an
information system.
• It evaluates if the system is susceptible to any known vulnerabilities, assigns
severity levels to those vulnerabilities, and recommends remediation or
mitigation, if and whenever needed.
• Examples of threats that can be prevented by vulnerability assessment include:
3. Insecure defaults – software that ships with insecure settings, such as a guessable
admin passwords.
4.3.3 Vulnerability Assessment: Continue….
• There are several types of vulnerability assessments. These include:
1. Low interaction honeypots: Low interaction honeypots gives very little insight
and control to the hacker about the network.
• It simulates only the services that are frequently requested by the attackers. The main
operating system is not involved in the low interaction systems and therefore it is less
risky.
4.3.7.1 Types of Honeypot: Continue……
• They require very fewer resources and are easy to deploy.
• The only disadvantage of these honeypots lies in the fact that experienced hackers
can easily identify these honeypots and can avoid it.
4. Improves security.