20050214-Juniper-Lopez
Download
Report
Transcript 20050214-Juniper-Lopez
Defending the
Campus
Ed Lopez – Emerging Technologies
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
1
“The Headlines”
“’MafiaBoy’ DDoS Attack Via University Network”
“Postdoc Arrest Linked to Intellectual Property Theft from University
Labs”
“Hack on University Exposes 1.4M Social Security Numbers”
“Universities Fear 6th of Month as Klez Virus Re-erupts”
“RIAA Sues Campus File-Swappers”
“Weak Security Causes University to Ban Unauthorized Wi-Fi on Campus
Nets”
“Campus Networks: Havens for Spammers?”
“Vital Files Exposed in University Hacking, 32,000 Students and
Employees Affected”
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
2
Our Users – Our Problem
Students – Bandwidth, Active Threat, No Standards
Faculty – Openess, Intellectual Property, Communication
Administration – Privacy/Financial/Academic Data, Web
Services
Facilities/Security – Operations, Logistics, Emergency
Services
Health Services – HIPPA, Medical Support Systems
Externals – Support for Gov’t Projects, External/Joint
Academics, Libraries, Research
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
3
Security is in How We Access Our
Networks
Dormitories – Wired/Wireless, >1 host to 1 student
Libraries – Shared systems, public/anonymous access
Commons – Wireless, rogues, ‘evil twins’
Telecommuters – Commuting Students, Off-Campus
Housing, Fraternities/Sororities, ‘Starbucks’ and other
community outlets
Educational Areas – May have specialized requirements,
especially science departments
Health Services & Administration – Autonomous but linked
Externals – Dedicated support requirements, threat from
external security breaches
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
4
Campuses – Crucibles for New
Technologies and Security Issues
Varied OS Support: Windows (multiple versions), MacOS,
Linux, BSD, Palm, PocketPC, new handhelds
No Personal Firewall/Anti-Virus Standards
VoIP: Internally supported, Vonage, etc.
Authentication: Passwords (weak), Tokens, SSN vs. Unique
Number, Single Sign-On vs. Segmentation
Wireless vs. Wired
Many Back Channels: POP3, IM, IRC, P2P, FTP, etc.
Music: P2P vs. Legal Downloads
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
5
What We Intended
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
6
What We Ended Up With
Social Engineering
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
7
Firewalls Alone Are Not Enough
A TCP/80 client session:
• Is it MSIE?
• Is it Mozilla Firefox?
• Is it a Warez P2P Session?
Firewalls, even with application intelligence, only deal with Layer 3&4
But with convergence of multiple applications around well-known ports &
protocols, how do we differentiate the legitimate ones from the rogue ones?
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
8
Layered Threats – Layered
Defenses
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
9
Domino Effect
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
10
Security Is Not Required for
Applications & Networks to Function!
Everything works in the lab!
Trust is inherent to design!
What are your policies?
How are they enforced?
How do you detect/prevent malicious traffic, rogue
host/apps, and misuse?
What is really on your network?
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
11
Security Requirements for the Campus
Access Defense at Network/Data Centers – No effective perimeters, no
control of end-user hosts
Network Awareness – Variable users/access/technologies make for
quickly changing threats
QoS - defending bandwidth for necessary resources, mitigating DoS
attacks, policy conformance
Segregation of IP Networks – With use of common infrastructure
Standardization Where Possible – Enforcement of security processes is a
must for applications, data centers, and systems holding sensitive data
Provisioned Services – Key to consistant delivery of managable services
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
12
Securing Access
Wireless Access = Remote Access
Common solution sets mean ease of deployment and common user experience
• Can implement roles-based policies
SSL VPNs are your friend
• Clientless – Just need a browser
• Encryption offers confidentiality, integrity of traffic
• Defend Remote Access, Wireless Access, Access to Data Centers
You can’t rely on host-based defenses, defend at the ingress
• Perimeter defenses (Firewall, ACL)
• NAV and Anti-spam on campus web/mail services
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
13
Securing Data Centers
Best defenses are based on knowing what to
defend
• You may not control the clients, but you do
control the servers
Tight perimeter defenses
Portaling
Intrusion Detection/Prevention
Honeypots / Honeynets
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
14
Importance of Network Awareness
“Network awareness now a new mindset for
security professionals.”
“Every component of the network is part of the
ecosystem.”
“The end user is the moving chess piece of the
network board.”
“The really good intruders study the environment
before attacking.”
Source: Network Awareness,
whitepaper by BlackHat Consulting
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
15
IDS – Intrusion Detection System
Typically out of line of the data flow on a tap. Evaluates deeper into
the packet to validate protocol, search for exploits and anomalies.
All 7 layers of the OSI model can be parsed.
IDS
Copyright © 2004 Juniper Networks, Inc.
HELP
Dynamic ACL request
sent to the
router/firewall, or TCP
RESET sent to close
the session
Proprietary and Confidential
www.juniper.net
16
IPS – Intrusion Prevention System
Typically inline of the data flow. Evaluates deeper into the packet to
validate protocol, search for exploits and anomalies. All 7 layers of
the OSI model can be parsed. Does not have to rely on other devices
in the network to complete it’s task.
IPS
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
17
Network Awareness – Know Your Threat!
Who is peering
with your critical
systems?
Who are the IRC
bots?
Who is probing
your network?
Correlate security
events to
hosts/network
objects
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
18
Network QoS – Managed Unfairness
Classify
Schedule
Transmit
VoIP
Gold
Gold
VoIP
Silver
Silver
Silver
Gold
VoIP
Best
Effort
Bandwidth isn’t free and all traffic is not equal
Migration continues toward converged network, with multiple services over IP
Need to distinguish between the multiple services on the converged network infrastructure
Examples: voice and real-time video
Implementing QoS allows us to utilize existing bandwidth better
QoS tools can be used as security tools to safeguard priority network services and applications
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
19
Segregating IP Networks - MPLS
Wireless Access
Multiple IP nets / Common Infrastructure
Security, Access Control at the Edge
Provisioned Services - Managability
Campus Network
IP/MPLS
Remote Campus
Housing
CE
PE
P
VoIP
Internet Access
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
20
Standardization
Openness applies to the user community, not to
campus administration and staff
Deployed network applications and services must
be tightly defined
IDS/IPS to look for malicious traffic within these
applications and services
Standardized authentication systems – centralized
online identity control
Operational & management support is key to policy
enforcement
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
21
Provisioned Services
Bring all of these security concepts together
• Portaling – Present services in a consistent fashion,
roles-based authentication
• Network Awareness – Defining and provisioning services
provides a clear scope
• QoS – Protect service resources
• Segregation – Reduces threat vectors and malicious
logic trees between services
• Standardization – Building security in what we deploy
Create an atmosphere of what we can do, vs. what we can’t
Copyright © 2004 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
22
Juniper Networks Portfolio
Secure Meeting
Policy & Service
Control
Secure Access SSL VPN
Central Policy-based Management
Integrated Firewall/IPSEC VPN
Intrusion Detection and Prevention
NMC-RX
JUNOScope
Enterprise Routing
J-series
Copyright © 2004 Juniper Networks, Inc.
Large Core Metro
Aggregation
BRAS & Circuit Aggregation Small/Med Core
Circuit Aggregation
E-series
M-series
T-series
Proprietary and Confidential
www.juniper.net
23
Thank You!
[email protected]