Network DefenseοΏ½
Dr. Mohammad Shoab
Outline
Security Vulnerabilities
Why?
Security Flaws in IP
Internet
2.1.1.1
C
1.1.1.1
1.1.1.2
A
B
1.1.1.3
S
Security Flaws in IP
Ping Flood
Attacking System
Internet
Broadcast Enabled Network
Victim System
ICMP Attacks
Routing Attacks
TCP Attacks
Issues?
Client
Server
SYN x
SYN y | ACK x+1
ACK y+1
TCP Layer Attacks
TCP Layer Attacks
TCP Layer Attacks
Application Layer Attacks
Outline
You are here
Denial of Service
Denial of Service
Simple DoS
Attacker
Victim
Victim
Victim
source address to hide origin
Coordinated DoS
Attacker
Victim
Victim
Victim
Attacker
Attacker
Distributed DoS
Attacker
Handler
Handler
Agent
Agent
Agent
Agent
Agent
Victim
Distributed DoS
Outline
You are here
Firewalls
Firewalls (contdβ¦)
Internet
Internal Network
Firewall
Packet Filters
Packet Filters Contd.
Packet Filters Contd.
Typical Firewall Configuration
Internet
Intranet
DMZ
X
X
Example Firewall Rules
Sample Firewall Rule
Dst Port
Alow
Allow
Yes
Any
> 1023
22
TCP
22
TCP
> 1023
Ext
Int
Out
SSH-2
Int
Ext
In
SSH-1
Dst Addr
Proto
Ack Set?
Action
Src Port
Src Addr
Dir
Rule
SYN
SYN/ACK
ACK
Client
Server
Default Firewall Rules
Any
Dst Port
Any
Deny
Any
Any
Int
Any
Int
In
Ingress
Deny
Any
Any
Ext
Any
Ext
Out
Egress
Any
Deny
Any
Any
Any
Any
Any
Any
Default
Dst Addr
Proto
Ack Set?
Action
Src Port
Src Addr
Dir
Rule
Packet Filters
Alternatives
Alternatives
Proxy Firewall
Outline
You are here
Intrusion Detection Systems
Types of IDS
Host-based
Network-based
Signature-based
Anomaly-based
Signature-based IDS
Anomaly-based IDS
Network-based IDS
Host-based IDS
Thank You