Podcast
Questions and Answers
What type of network infrastructure is primarily used to monitor internal servers and database resources?
What type of network infrastructure is primarily used to monitor internal servers and database resources?
- NIDS (correct)
- LAN switch
- Workstation
- Router
Which of the following is NOT a common type of malware?
Which of the following is NOT a common type of malware?
- Rootkit
- Trojan Horse
- Firewall (correct)
- Botnet
According to NIST SP 800-83, what is the primary purpose of malware?
According to NIST SP 800-83, what is the primary purpose of malware?
- To enhance system performance
- To compromise the confidentiality, integrity, or availability of data (correct)
- To improve user experience
- To provide a secure communication channel
Which type of malware is designed to replicate itself and spread to other systems?
Which type of malware is designed to replicate itself and spread to other systems?
Which of the following is NOT a common method of malware distribution?
Which of the following is NOT a common method of malware distribution?
What type of network infrastructure is commonly used to support user workstations within a single department?
What type of network infrastructure is commonly used to support user workstations within a single department?
Which of the following is a type of malware that can be used to control a compromised system remotely?
Which of the following is a type of malware that can be used to control a compromised system remotely?
What is the primary difference between a virus and a worm?
What is the primary difference between a virus and a worm?
What is the primary purpose of a Host-Based IDS?
What is the primary purpose of a Host-Based IDS?
Which of the following methods can a Host-Based IDS use for detection?
Which of the following methods can a Host-Based IDS use for detection?
How does a Network IDS capture network traffic?
How does a Network IDS capture network traffic?
What type of signatures might a Network IDS use to detect attacks?
What type of signatures might a Network IDS use to detect attacks?
Which type of intrusions can a Host-Based IDS detect?
Which type of intrusions can a Host-Based IDS detect?
Which ports are frequently attacked according to the provided information?
Which ports are frequently attacked according to the provided information?
What is a characteristic of packets considered to be of interest?
What is a characteristic of packets considered to be of interest?
Where is a Network Intrusion Detection System (NIDS) typically placed to monitor for penetration attempts?
Where is a Network Intrusion Detection System (NIDS) typically placed to monitor for penetration attempts?
What combination of packet conditions is an example of a condition that should be monitored?
What combination of packet conditions is an example of a condition that should be monitored?
What is a key purpose of placing a NIDS in the DMZ of a network?
What is a key purpose of placing a NIDS in the DMZ of a network?
Which of the following is NOT true about dangerous packet combinations?
Which of the following is NOT true about dangerous packet combinations?
What role does an internal firewall play in network security?
What role does an internal firewall play in network security?
Which of these ports is NOT listed as frequently attacked?
Which of these ports is NOT listed as frequently attacked?
What is the main assumption of Zero Trust regarding trust levels for users and assets?
What is the main assumption of Zero Trust regarding trust levels for users and assets?
What does Zero Trust Architecture (ZTA) aim to protect?
What does Zero Trust Architecture (ZTA) aim to protect?
Which components are included in Zero Trust Access (ZTA)?
Which components are included in Zero Trust Access (ZTA)?
What must the system validate before granting access to an enterprise resource?
What must the system validate before granting access to an enterprise resource?
Which deployment model is NOT mentioned in the ZTA deployment types?
Which deployment model is NOT mentioned in the ZTA deployment types?
What is the focus of attack prevention mechanisms in DDoS countermeasures?
What is the focus of attack prevention mechanisms in DDoS countermeasures?
What is a potential threat to Zero Trust Architecture?
What is a potential threat to Zero Trust Architecture?
What primarily occurs during a direct DDoS attack?
What primarily occurs during a direct DDoS attack?
What is the role of the Policy Enforcement Point (PEP)?
What is the role of the Policy Enforcement Point (PEP)?
What is the primary goal of a Denial-of-Service (DoS) attack?
What is the primary goal of a Denial-of-Service (DoS) attack?
What is a characteristic of reflector DDoS attacks?
What is a characteristic of reflector DDoS attacks?
What is one common misconception about Zero Trust concerning user accounts?
What is one common misconception about Zero Trust concerning user accounts?
How does a typical Distributed Denial-of-Service (DDoS) attack operate?
How does a typical Distributed Denial-of-Service (DDoS) attack operate?
Which of the following is a method of attack detection during a DDoS attack?
Which of the following is a method of attack detection during a DDoS attack?
What was the main purpose of the first release of Onion Routing in 2002?
What was the main purpose of the first release of Onion Routing in 2002?
What characterizes a Distributed SYN Flood attack?
What characterizes a Distributed SYN Flood attack?
How does TLS tunneling enhance Onion Routing's effectiveness?
How does TLS tunneling enhance Onion Routing's effectiveness?
What happens when a server experiences a DoS attack?
What happens when a server experiences a DoS attack?
Which of the following best describes the impact of a DoS attack on users?
Which of the following best describes the impact of a DoS attack on users?
What is a limitation of attack source traceback in DDoS countermeasures?
What is a limitation of attack source traceback in DDoS countermeasures?
Which aspect of the Onion Routing framework helps mitigate against side channel attacks?
Which aspect of the Onion Routing framework helps mitigate against side channel attacks?
What distinguishes a DDoS attack from a standard DoS attack?
What distinguishes a DDoS attack from a standard DoS attack?
In the context of network security, what primarily makes an attack 'distributed'?
In the context of network security, what primarily makes an attack 'distributed'?
When a DDoS attack is successful, what is an immediate effect on the targeted web server?
When a DDoS attack is successful, what is an immediate effect on the targeted web server?
Flashcards
Host-Based IDS
Host-Based IDS
Systems that monitor and protect individual hosts from intrusions.
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
An IDS monitors network or system activities for malicious actions or policy violations.
Network IDS
Network IDS
A system that monitors network traffic to detect intrusion attempts and anomalies.
Threshold Detection
Threshold Detection
Signup and view all the flashcards
String Signatures
String Signatures
Signup and view all the flashcards
Zero Trust
Zero Trust
Signup and view all the flashcards
Zero Trust Architecture (ZTA)
Zero Trust Architecture (ZTA)
Signup and view all the flashcards
Policy Decision Point (PDP)
Policy Decision Point (PDP)
Signup and view all the flashcards
Policy Enforcement Point (PEP)
Policy Enforcement Point (PEP)
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
ZTA Threats
ZTA Threats
Signup and view all the flashcards
Enclave Gateway Model
Enclave Gateway Model
Signup and view all the flashcards
Port Signatures
Port Signatures
Signup and view all the flashcards
Attacked Ports
Attacked Ports
Signup and view all the flashcards
Packet Signatures
Packet Signatures
Signup and view all the flashcards
Header Conditions
Header Conditions
Signup and view all the flashcards
WinNuke Attack
WinNuke Attack
Signup and view all the flashcards
Network IDS Locations
Network IDS Locations
Signup and view all the flashcards
Internal Server Security
Internal Server Security
Signup and view all the flashcards
DMZ in Networking
DMZ in Networking
Signup and view all the flashcards
NIDS
NIDS
Signup and view all the flashcards
Malicious Software
Malicious Software
Signup and view all the flashcards
Types of Malware
Types of Malware
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Denial-of-Service Attack
Denial-of-Service Attack
Signup and view all the flashcards
DoS Attack
DoS Attack
Signup and view all the flashcards
DDoS Attack
DDoS Attack
Signup and view all the flashcards
Flooding
Flooding
Signup and view all the flashcards
Compromised Hosts
Compromised Hosts
Signup and view all the flashcards
SYN Flood Attack
SYN Flood Attack
Signup and view all the flashcards
Useless Packets
Useless Packets
Signup and view all the flashcards
Target Web Server
Target Web Server
Signup and view all the flashcards
Legitimate Users
Legitimate Users
Signup and view all the flashcards
Direct DDoS Attack
Direct DDoS Attack
Signup and view all the flashcards
Reflector DDoS Attack
Reflector DDoS Attack
Signup and view all the flashcards
Attack Prevention
Attack Prevention
Signup and view all the flashcards
Attack Detection
Attack Detection
Signup and view all the flashcards
Packet Filtering
Packet Filtering
Signup and view all the flashcards
Onion Routing
Onion Routing
Signup and view all the flashcards
TLS Tunneling
TLS Tunneling
Signup and view all the flashcards
Study Notes
Network Security
- XII: Network Endpoint Security
- Presented by Prof. Dr. Torsten Braun, Institute for Informatics
- Dates: December 2nd, 2024 - December 9th, 2024
- Location: Bern
Table of Contents
- Firewalls
- Intrusion Detection Systems
- Malicious Software
- Denial of Service Attacks
- The Onion Routing
- Securing BGP Inter-Domain Routing
- Scalability, Control, and Isolation on Next-Generation Networks
- NIST Zero-Trust Architecture
Firewalls
- Introduction
- Important complement to host-based security services (like intrusion detection systems).
- Typically placed between the internal network and the internet, creating a controlled link and an outer security wall.
- Provides an additional layer of defense and isolates internal systems from external networks.
- Design Goals
- All traffic in both directions must pass through the firewall. This is achieved by blocking all access to the local network except via the firewall.
- Firewall itself must invulnerable to penetration, needing a hardened system with a secured operating system.
- Techniques
- Service control: Determines inbound and outbound internet services accessible. Firewalls may filter traffic by IP address, protocol, or port number.
- Direction control: Determines the direction of service requests flowing through the firewall.
- User control: Controls access to a service based on the user attempting to access it (typically applied to local users).
- Capabilities
- Defines a single choke point to prevent unauthorized users from entering/leaving the network.
- Prohibits potentially vulnerable services.
- Provides protection against various IP spoofing and routing attacks.
- Consolidates security capabilities on a single system.
- Limitations
- Cannot protect against attacks that bypass the firewall.
- May not fully protect against internal threats (e.g., misbehaving employees).
- An improperly secured wireless LAN can be accessed from outside the organization.
- Mobile devices can be used to infect the internal network.
- General Model
- Diagram showing internal (protected network) and external (untrusted network) with a firewall between them.
- Types of firewalls discussed: Packet Filtering, Stateful Inspection, Application Proxy, and Circuit-level Proxy Firewalls.
- Packet Filtering Firewall
- Filtering rules based on matching fields in the IP or TCP header (e.g., source/destination IP address, port number). Default: discard packets it does not match.
Firewalls (Cont.)
- Examples (Packet Filtering Example)
- Rule sets for controlling inbound and outbound traffic (e.g., allowing or blocking traffic to/from a certain port number).
- Weaknesses
- Doesn't analyze upper-layer data, making it vulnerable to specific application vulnerabilities.
- Limited logging functionality with restricted log information.
- Attacks and Countermeasures
- IP address spoofing: Discard packets with inside source addresses arriving on external interfaces.
- Source routing attacks: Discard packets using this option.
- Tiny fragment attacks: Enforce a rule that the first packet fragment contains a predefined minimum amount of transport header data. Discard all subsequent fragments if the first is rejected.
Intrusion Detection Systems
- Terms
- Intrusion: Violations of security policy, including attempts to affect confidentiality, integrity, or availability.
- Intrusion Detection: Process of collecting information about events in a computer system or network, analyzing them for intrusion signs.
- Intrusion Detection System (IDS): Hardware or software that gathers/analyzes information to find and warn about unauthorized access attempts.
- Classification
- Host-based IDS: Monitors a single host for suspicious activity and events.
- Network-based IDS: Monitors network traffic for suspicious activity on particular network segments or devices.
- Components
- Sensors: Collect data from the system (e.g., network packets, logs).
- Analyzers: Process sensor data to determine if an intrusion occurred, giving actions as necessary.
- User interface: Allows users to view alerts and system behavior.
Intrusion Detection Systems (Cont.)
- Misuse and Anomaly Detection
- Misuse detection: Based on known attack patterns or signatures.
- Anomaly detection: Looks for deviations from normal behavior.
- Behavior of Intruders and Authorized Users
- Diagram showing different behavior profiles (normal and intruder) in a density function.
- Host-Based IDS
- Adds a specialized security layer for vulnerable systems (like database servers).
- Monitors system activity for suspicious behavior.
- Can halt attacks before damage
- Logs suspicious events and sends alerts.
- Network IDS
- Monitors network traffic within particular segments.
- Network IDS Location
- Outside main enterprise firewalls.
- In the network DMZ (Demilitarized Zone).
- Behind internal firewalls to monitor internal/external traffic.
- Network IDS Function
- String signatures: Identify attack strings/text.
- Port signatures: Watch for connection attempts to commonly attacked ports.
- Header condition signatures: Analyze headers for unusual, suspicious patterns.
Malicious Software- Overview:
- Definition: Program covertly inserted into another program to destroy data, run harmful programs, or compromise confidentiality, integrity, or the availability of the data, applications, or operating system.
- Malware Types:
- Virus
- Worm
- Trojan Horse
- Spyware
- Rootkit
- Backdoor
- Mobile code
- Bot
- Malware Defense
- Real-time/Near Real-time.
- Network Traffic Analysis.
- Payload Analysis.
- Endpoint Behavior Analysis.
- Incident Management and Forensics.
Denial-of-Service Attacks
- Overview: Attacks that make computer systems/networks inaccessible by flooding them with useless traffic.
- Direct DDoS Attack:
- Attacker implants malicious software (zombie) on many sites across the internet to create master and slave networks for coordinated attacks against the target machine.
- Reflector DDoS Attack:
- Slave zombies send packets to uninfected machines, known as reflectors. These machines respond with packets targeted back at the target machine.
BGP (Border Gateway Protocol)
- Overview: Used to exchange routing information between autonomous systems (ASs) on the internet.
- Messages: Has defined messages (OPEN, UPDATE, NOTIFICATION, KEEPALIVE, ROUTE-REFRESH) used in inter-system communication.
- Security: BGP is vulnerable to TCP threats (e.g., eavesdropping, spurious session resets, session capture, message alternation), and other threats (e.g., session hijacking, replay attacks, withholding traffic, and saturation attacks).
- BGP Issues: Verification of BGP identities, BGP information, and forwarding paths is crucial, but these are often insufficiently validated.
- BGP security requirements: BGP messages should contain cryptographic signatures; the order of the announced prefix in the advertisements must be correct.
- BGP Weaknesses: No mechanism for protecting the integrity/authenticity of BGP update messages.
- BGP Session Protection: Uses IPSec or TCP-based approaches for better security.
- Secure BGP: Implements digital signatures on the address and AS Path information contained in routing advertisements.
Scalability, Control, and Isolation on Next-Generation Networks
- Motivation: Aims to increase Internet availability, address outages and hijacking.
- Reasons for outages:
- Protocols (e.g., BGP protocol).
- Route changes and delays.
- Misconfigurations.
- Attacks (e.g., hijacking).
- SCION Network Availability:
- The main issue in maintaining the security of network communications and preventing disruption.
- Attack objectives can include disrupting routing systems, DDoS attacks, or address hijacking.
- SCION Limitations:
- Frequent changes.
- Slow convergence.
- Vulnerability to attacks and misconfigurations.
- Poor path predictability/reliability.
The Onion Routing
- Overview: Widely used anonymity network based on Onion Routing ideas. First released in 2002.
- Tunneling: Diagram illustrates the relay system used for secure communication in Onion Routing.
- TLS Tunneling: Shows step-by-step illustration of secure communication.
Zero Trust Architecture
- Motivation: An enterprise's cybersecurity plan. Response to trends such as remote users, Bring Your Own Device (BYOD), and cloud-based assets.
- Zero Trust Access: Subjects gaining access to enterprise resources must be authenticated, and requests validated by PDP/PEP.
- Logical Components: Diagram illustrates the control plane (Policy Engine, Policy Administrator, Policy Decision Point) and the data plane (System, Gateway, and Enterprise Resource).
- Deployment: Different models for ZTA, including device agent/gateway, enclave gateway, and resource portal, each illustrated by a diagram.
- Threats:
- ZTA decision process issues
- Denial of service, disruption.
- Theft of credentials and insider threats.
- Network visibility
SCION Overview:
- Control Plane: Responsible for finding and disseminating paths. Includes path exploration and registration functions.
- Data Plane: Responsible for how packets are sent. This includes path lookups and combination of segments.
SCION Problems and Issues:
- Weakest-link security issues
- Revocation problem
- Various schemes and trust issues
- Transparency problem
- Imbalance
- Misconfigurations
- Lack of Scalability
SCION Use Cases:
- SCION's use in the ETH domain, the secure Swiss financial network, and SWITCHlan SCION Access.
SCION Deployment:
- Core routers are set up at the borders of ISPs to collect customer access.Â
- No changes to the network infrastructure needed.
- SCION IP gateway facilitates integration with existing networks.
- No end host or application upgrades are needed when implementing SCION.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.