Network Security Devices, Design, and Technology
Security Through Network Devices
- Security can be achieved through:
- Security features in standard networking devices.
- Hardware designed primarily for security.
Standard Network Devices
- Classified by the OSI layer at which they function.
- OSI model breaks networking into seven layers, each with different tasks, cooperating with adjacent layers.
- Security functions of network devices provide a degree of network security.
- Improperly configured devices introduce vulnerabilities.
- Examples:
- Bridges
- Switches
- Routers
- Load balancers
- Proxies
Bridges
- Hardware device or software to join two separate computer networks, enabling communication.
- Connects two LANs or network segments (subnets).
- Operate at the Data Link layer (Layer 2); connected networks/segments must use the same Layer 2 protocol (e.g., Ethernet).
- Most OSs allow for software bridges, but creating one could introduce security vulnerabilities.
Switches
- Connect network hosts intelligently.
- Learn which device is connected to each port.
- Examines the MAC address of received frames and associates its port with the MAC address.
- Stores addresses in a MAC address table.
- Forwards frames intended for a specific device (unicast) instead of broadcasting.
- Proper configuration is important for security, including:
- Loop prevention
- Flood guard
Flood Guard
- Defense against MAC flooding attacks. A threat agent overflows the switch with spoofed Ethernet frames, each with a different source MAC address.
- Switches with port security can limit the number of MAC addresses learned on ports.
Routers
- Forward packets across different computer networks.
- Operate at the Network Layer (Layer 3).
- Can filter specific types of network traffic using an Access Control List (ACL).
- Can limit traffic entering from unapproved networks.
Load Balancers
- Help evenly distribute work across a network.
- Allocate requests among multiple devices.
Advantages
Reduces the probability of overloading a single server.
Optimizes bandwidth of network computers.
Load balancing achieved via software or hardware.
Categories:
- Layer 4 load balancers: act upon data in Network and Transport layer protocols.
- Layer 7 load balancers: distribute requests based on data in Application layer protocols.
Scheduling Protocols
- Round-robin
- Affinity
- Other
Proxies
- Intercept user requests from the internal network and processes the request on behalf of the user.
- Types:
- Forward proxy: intercepts user requests from the internal network.
- Application/multipurpose proxy: "knows" the application protocols.
- Reverse proxy: routes requests from an external network to the correct internal server.
- Transparent proxy: requires no configuration on the user’s computer.
Advantages:
- Increased speed
- Reduced costs
- Improved management
- Stronger security
Network Security Hardware
- Specifically designed security hardware devices provide greater protection.
Firewalls
- Can be software or hardware-based.
- Both inspect packets and either accept or deny entry.
- Hardware firewalls are typically more expensive and difficult to configure/manage.
- Software firewalls (host-based firewalls) running on a device protect only that device.
- All modern OSs include a software firewall.
Network-Based Firewalls
Methods of packet filtering:
- Stateless packet filtering:
- Inspects incoming packets and permits or denies based on administrator-defined conditions.
- Stateful packet filtering:
- Keeps a record of the state of a connection.
- Makes decisions based on the connection and conditions.
Firewall actions on a packet:
- Allow:
- Let the packet pass through.
- Drop:
- Prevent the packet from passing into the network and send no response to the sender.
- Reject:
- Prevent the packet from passing into the network but send a message to the sender.
Rule-based Firewalls
- Use a set of individual instructions to control actions.
- Each rule is a separate instruction processed in sequence.
- Rules are stored in text files read when the firewall starts.
- Static in nature, limited to configured actions.
Application-Based Firewalls
- Operate at a higher level, identifying applications and making decisions about actions.
Identification Methods:
- Predefined application signatures
- Header inspection
- Payload analysis
Web Application Firewall
- A special type of application-aware firewall that inspects HTTP traffic.
- Can block specific sites or types of HTTP traffic.
Virtual Private Network (VPN) Concentrator
- VPN enables authorized users to use an unsecured public network as if it were a secure private network.
- All data transmitted is encrypted.
Types of VPNs
- Remote-access VPN: user-to-LAN connection.
- Site-to-site: multiple sites connect over the Internet.
- Always-on VPNs: allows the user to always stay connected.
Endpoints
- The end of the tunnel between VPN devices.
- May be software on a local computer or a VPN concentrator.
VPN Concentrator
- A dedicated hardware device that aggregates VPN connections.
- Options when using a VPN:
- Full tunnel: all traffic is sent to the VPN concentrator and protected.
- Split tunneling: some traffic is routed over the secure VPN, while other traffic directly accesses the Internet.
Mail Gateway
- Monitors emails for unwanted content.
- Prevents unwanted messages from being delivered.
- Email systems:
- SMTP and POP/POP3.
- IMAP (more recent): email remains on the email server and is not downloaded to a user’s computer.
Functions:
- For inbound emails:
- Searches for malware, spam, and phishing attacks.
- For outbound email:
- Detects and blocks the transmission of sensitive data.
Network Intrusion Detection and Prevention
Intrusion detection system (IDS):
- Can detect an attack as it occurs.
Types:
- Inline IDS:
- Connected directly to the network and monitors the flow of data.
- Passive IDS:
- Connected to a port on a switch, which receives a copy of network traffic.
Management:
- In-band: through the network using network protocols and tools.
- Out-of-band: using an independent and dedicated channel.
| Function | Inline | Passive |
|---|---|---|
| Connection | Directly to network | Connected to port on switch |
| Traffic flow | Routed through the device | Receives copy of traffic |
| Blocking | Can block attacks | Cannot block attacks |
| Detection error | May disrupt service | May cause false alarm |
Monitoring Methodologies
- Anomaly-based monitoring:
- Compares current behavior with a baseline.
- Signature-based monitoring:
- Looks for well-known attack signature patterns.
- Behavior-based monitoring:
- Detects abnormal actions by processes or programs.
- Alerts user who decides whether to allow or block activity.
- Heuristic monitoring:
- Uses experience-based techniques.
Types of IDS
- Host intrusion detection system (HIDS):
- A software-based application that can detect an attack as it occurs.
- Installed on each system needing protection.
- Monitors system calls, file system access, and unauthorized Registry modifications.
- Detects anomalous activity.
Disadvantages of HIDS
Cannot monitor network traffic that does not reach the local system.
All log data is stored locally.
Resource-intensive and can slow the system.
Network intrusion detection system (NIDS):
- Watches for attacks on the network.
- NIDS sensors are installed on firewalls and routers to gather information and report back to a central device.
- NIDS can sound an alarm and log events.
Application-aware IDS:
- A specialized IDS that uses “contextual knowledge” in real-time.
- Knows the OS version, applications running, and vulnerabilities present.
Intrusion Prevention Systems (IPSs)
- Monitors network traffic to immediately block a malicious attack.
- Similar to NIDS but located “in line” on the firewall for quicker action.
- Application-aware IPS knows which applications are running as well as the underlying OS.
Security and Information Event Management (SIEM)
- Consolidates real-time monitoring and management of security information.
- Analyzes and reports on security events.
- Can be a separate device, software, or a third-party service.
Features:
- Aggregation
- Correlation
- Automated alerting and triggers
- Time synchronization
- Event duplication
- SIEM logs
Other Network Security Hardware Devices
| Name | Description | Comments |
|---|---|---|
| Hardware security module | A dedicated cryptographic processor that provides protection for cryptographic keys. | A tamper-resistant device that can securely manage, process, and store cryptographic keys. |
| SSL decryptor | A separate device that decrypts SSL traffic. | Helps reduce performance degradation and eliminates the need to have multiple decryption licenses spread across multiple devices. |
| SSL/TLS accelerator | A separate hardware card that inserts into a web server that contains one or more co-processors to handle SSL/TLS processing. | Used to accelerate the computationally intensive initial SSL connection handshake, during which keys are generated for symmetric encryption using 3 DES or AES. |
| Media gateway | A device that converts media data from one format to another. | Sometimes called a softswitch, converts data in audio or video format. |
| Unified Threat Management (UTM) | Integrated device that combines several security functions. | Multipurpose security appliance that provides an array of security functions, such as antispam, antiphishing, antispyware, encryption, intrusion protection, and web filtering. |
| Internet content filter | Monitors Internet traffic and blocks access to preselected websites and files. | Restricts unapproved websites based on URL or by searching for and matching keywords such as sex or hate as well as looking for malware. |
| Web security gateway | Blocks malicious content in real-time as it appears without first knowing the URL of a dangerous site. | Enables a higher level of defense by examining the content through application-level filtering. |
Security Through Network Architecture
- The design of a network can provide a secure foundation for resisting attackers.
Elements
- Creating security zones
- Using network segregation
Security Zones
- Partition the network so that certain users may enter one zone while access is prohibited to others.
Common Zones
- Demilitarized zones
- Using network address translation to create zones
Demilitarized Zone (DMZ)
- A separate network located outside the secure network perimeter.
- Untrusted outside users can access the DMZ but not the secure network.
Network Address Translation (NAT)
- Allows private IP addresses to be used on the public Internet.
- Replaces private IP address with a public address.
Advantage
- Masks IP addresses of internal devices.
- An attacker cannot determine the actual IP address of the sender.
Other Zones
| Name | Description | Security Benefits |
|---|---|---|
| Intranet | A private network that belongs to an organization that can only be accessed by approved internal users. | Closed to the outside public, thus data is less vulnerable to external threat actors. |
| Extranet | A private network that can be accessed by authorized external customers, vendors, and partners. | Can provide enhanced security for outside users compared to a publicly accessible website. |
| Guest network | A separate open network that anyone can access without prior authorization. | Permits access to general network resources like web surfing without using the secure network. |
Network Segregation
Physical network segregation
- Isolates the network so that it is not accessible by outsiders.
Air gap
- The absence of any type of connection between devices (secure network and another network).
- Networks can be segmented using switches into a hierarchy.
- Core switches reside at the top and carry traffic between switches.
- Workgroup switches are connected directly to devices.
Virtual LAN (VLAN)
- Allows scattered users to be logically grouped together, even if attached to different switches.
- Can isolate sensitive data to VLAN members.
Communication on a VLAN
- If connected to the same switch, the switch handles packet transfer.
- A special “tagging” protocol is used for communicating between switches.
Security Through Network Technologies
Technologies
- Network access control
- Data loss prevention
Network Access Control (NAC)
- Examines the current state of a system or network device before it can connect to the network.
- Devices not meeting specified criteria connect to a “quarantine” network for correction.
Goal
- To prevent computers with suboptimal security from infecting others.
- NAC uses software “agents” for information gathering (host agent health checks).
Agent Types
- Permanent NAC agent
- Dissolvable NAC agent: disappears after reporting information
- Agentless NAC: Uses AD to scan the device
Data Loss Prevention (DLP)
- A system of security tools that recognizes and identifies critical data.
- Ensures data is protected.
Common uses
- Monitoring emails through a mail gateway
- Blocking copying of files to USB drives (USB blocking).
Content inspection
- A security analysis of the transaction within its approved context.
- Looks at the security level of data, who is requesting it, where it is stored, when it was requested, and where it is going.
DLP Sensors
- DLP network sensors
- DLP storage sensors
- DLP agent sensors
Actions upon Policy Violation Detection
- When a policy violation is detected by the DLP agent, it is reported back to the DLP server.
- Actions:
- Block the data
- Redirect it to an individual who can examine the request
- Quarantine the data until later
- Alert a supervisor of the request