Application-based Firewalls (2)
Download
Report
Transcript Application-based Firewalls (2)
FIREWALLS
An Important Component in Computer
Systems Security
By: Bao Ming Soh
What is a Firewall
hardware, software, or a combination
of both, that isolates an internal
network from the Internet.
filters information, allowing some
packets to pass and blocking others.
LAN vs. Individual
Why Use a Firewall
prevent denial of service attacks
– SYN flooding
prevent unauthorized access to
internal network
block Trojans / Application backdoors
– Sasser Worm
How Firewalls Work
NAT (Network Address Translation)
Packet Filtering
Stateful Packet Inspection (SPI)
Application-based
NAT (1)
Implemented in routers
Computers in the network have
different internal IP addresses
Outside world only see one IP address
NAT (2)
Packet Filtering
Allow/drop packets based on:
– source IP address, destination IP address
– TCP/UDP source and destination port
numbers
– ICMP message type
– TCP SYN and ACK bits
NAT & Packet Filtering
Advantage:
– Naturally provided by routers
Disadvantages:
– only allows connections originating from inside
the network
– Level of security decreases with # of ports open
– No outbound connection protection
Stateful Packet Inspection
(SPI)
Does not analyze various components
of an IP packet
Compares certain key parts of the
packet to a database of trusted
information
SPI (2)
Advantages:
– Overcomes inflexibility of NAT firewalls
– Only one port needs to be opened for
each service (e.g. FTP daemon)
Disadvantage:
– Additional performance overhead
Application-based
Firewalls (1)
Offer a more fine-grained control over
network traffic
Filter packets based on:
– Application
– IP Filtering
– Port numbers and protocols used
– Direction of traffic (inbound/outbound)
Application-based
Firewalls (2)
Advantages:
– More flexible than NAT-based firewalls
– Provides application-based outbound traffic
protection, in addition to inbound traffic
protection
– May block Trojan viruses
Disadvantage:
– Security depends heavily on user
Limitations of Firewalls
IP Spoofing
Communication vs. Performance vs.
Security
Application spoofing
Social Engineering
Content Attack
– confidential data transported into the
network through permitted connections
Leak Tests
“proof of concept” programs to show the
vulnerability of firewalls
Application-Masquerading
–
Solution: Checksums, MD5 Signatures
FireHole
–
–
Bypass outbound traffic protection through “dll
injection” Application hijack
Solution: Component Control
Conclusion
Firewalls are not fool-proof!
Essential to have a multi-layered
approach in any defense system