Perimeter Devices
Perimeter Devices
Outline
❑ IDS
❑ IPS
❑ Firewall
❑ NOC
❑ SOC
❑ SIEM
What Is IDS (Intrusion Detection System)?
• Application protocol-based: Place protection within a group of servers and watch how
they communicate with one another.
• Hybrid: A hybrid IDS combines both network-based and host-based approaches. This type
of IDS provides a more complete view of events within the IT ecosystem.
Working of IDS
IDS tools work by analyzing network packets and comparing them with known
attack signatures or behavioral patterns.
If the IDS believes that it has identified an intruder, it sends an alert to system
administrators or security teams.
These alerts contain detailed information about the detected activity, letting
employees quickly investigate and react.
IDS plays a vital role in maintaining the security and integrity of computer
networks and systems.
The benefits of IDS include:
• False positives and false negatives: IDS tools aren’t perfect; they can
generate both false positives (labeling benign events as threats) and
false negatives (failing to detect real threats).
• Inability to prevent attacks: IDS solutions can detect attacks once
they occur, but they are unable to prevent them from occurring in the
first place.
What Is IPS (Intrusion Prevention System)?
• Host-based: A host-based IPS (HIPS) is deployed on a specific machine or server, offering protection
to a single host. It monitors system activities and can take actions to block or limit access to system
resources.
• Wireless: Observe anything happening within a wireless network and defend against an attack
launched from there.
• Network behavior: Spot attacks that involve unusual traffic on your network.
• Hybrid: A hybrid IPS combines both network-based and host-based approaches. For example, a
hybrid IPS may be primarily network-based but also include features for protecting individual hosts.
The benefits of IPS include:
• The main difference between IDS and IPS is that while IDS tools are
only capable of detecting intrusions, IPS tools can actively prevent
them as well.
❑ Functionality: IDS tools are restricted to detecting threats, while IPS
tools can both detect and prevent them.
❑ Response: IDS tools send alerts when a threat is detected, while IPS
tools can automatically block threats based on predefined security
policies or rules.
❑ Workflow: IDS tools passively monitor data flow, while IPS tools
actively inspect network packets and take action to prevent or
mitigate threats
Advances in IDS/IPS Technology
• Machine learning and AI: IDS/IPS tools can use machine learning and
artificial intelligence to enhance their detection capabilities, learning
from historical data about cyber threats.
• Behavioral analysis: IDS/IPS tools can use a technique known as
behavioral analysis: comparing network traffic or user behavior to a
baseline that helps identify anomalies or deviations.
• Cloud-based deployments: With the increasing adoption of cloud
computing, many IDS/IPS tools can now be deployed in cloud-based
IT environments to make them more flexible and scalable.
IDS/IPS and Regulatory Compliance
❖ Installing IDS and IPS tools may be necessary for organizations to meet
regulatory compliance requirements. The use cases of IDS and IPS for
regulatory compliance include:
❖ Threat detection and incident response: IDS and IPS solutions actively
monitor network traffic, system logs, and events to detect and defend
against security threats.
❖ Protecting sensitive data: By blocking unauthorized access to confidential
information, IDS and IPS are invaluable tools for complying with data
privacy standards.
❖ Logging and reporting: IDS and IPS solutions generate system logs and
provide reporting capabilities that companies can use in the event of an
external audit.
Important Notes!
• Many data privacy and security regulations explicitly or implicitly
require organizations to implement IDS and IPS tools.
• Total prevention: IDS and IPS tools cannot offer 100 percent
protection against a cyber attacks. They can only detect suspicious
activity based on predefined rules and signatures, which limits them
to known attack patterns.
• No other defenses required: IDS and IPS solutions can be highly
effective, but they are only one piece of the cybersecurity puzzle,
along with tools such as firewalls and antimalware software.
• Only useful for large enterprises: IDS/IPS technology is effective for
businesses of all sizes and industries, from tiny startups to huge
multinational firms.
IDS vs IPS
• IDS and IPS are crucial network security technologies often confused
or used interchangeably. So, what’s the difference between IDS and
IPS, and which one is the best choice for your organizational needs?
List of software solution for IDS/IPS
Cisco NGIPS OSSEC
Corelight and Zeek Trend Micro
Fidelis Network TippingPoint
FireEye Intrusion Vectra Cognito
Prevention System BlueVector Cortex
ZScalar Cloud IPS
Hillstone S-Series
Snort
McAfee Network Security
Platform
What is SNORT ?
• In Linux:
• Step-1: wget https://www.snort.org/downloads/snort/snort-2.9.15.tar.gz
• Step-2: tar xvzf snort-2.9.15.tar.gz
• Step-3: cd snort-2.9.15
• Step-4: ./configure –enable-sourcefire && make && sudo make install
• In Windows:
• Step-1: Download SNORT installer from
https://www.snort.org/downloads/snort/Snort_2_9_15_Installer.exe
• Step-1: Execute the Snort_2_9_15_Installer.exe
Different SNORT Modes:
• Sniffer Mode –
To print TCP/IP header use command ./snort -v
To print IP address along with header use command ./snort -vd
• Packet Logging –
To store packet in disk you need to give path where you want to store
the logs. For this command is./snort -dev -l ./SnortLogs.
• Activate network intrusion detection mode –
To start this mode use this command ./snort -dev -l ./SnortLogs -h
192.127.1.0/24 -c snort.conf
Types of Rules in SNORT:
Additional Notes May have built-in IPS features Often deployed behind firewalls
Firewall
A firewall is a network security device that
prevents unauthorized access to a network.
https://www.eve-ng.net/
https://www.gns3.com/
Concept of Firewall
• The concept of the firewall was introduced to secure the
communication process between various networks.
• A firewall is a software or a hardware device that examines the data
from several networks and then either permits it or blocks it to
communicate with your network and this process is governed by a set
of predefined security guidelines.
Application of firewall
• A firewall is a device or a combination of systems that supervises the flow
of traffic between distinctive parts of the network.
• A firewall is used to guard the network against nasty people and prohibit
their actions at predefined boundary levels.
• A firewall is not only used to protect the system from exterior threats but
the threat can be internal as well.
• Therefore we need protection at each level of the hierarchy of networking
systems.
• A good firewall should be sufficient enough to deal with both internal and
external threats and be able to deal with malicious software such as worms
from acquiring access to the network.
• It also provisions your system to stop forwarding unlawful data to another
system.
Firewall
Scalable Performance
Access Validation
• Network Address Translation (NAT) is a process that enables one, unique IP address to represent an entire
group of computers.
• In network address translation, a network device, often a router or NAT firewall, assigns a computer or
computers inside a private network a public address.
• In this way, network address translation allows the single device to act as an intermediary or agent between
the local, private network and the public network that is the internet.
• NAT’s main purpose is to conserve the number of public IP addresses in use, for both security and economic
goals.
•
NAT
Firewall is a barrier between Local Area Network (LAN) and the Internet.
It allows keeping private resources confidential and minimizes the security risks.
It controls network traffic, in both directions.
How does a firewall work?
On the other hand, software firewall provision host-based security as the software is installed on each of the devices
connected to the network, thereby protecting the system from external as well as internal threats.
It is most widely used by mobile users to digitally protect their handset from malicious attacks.
Firewall and OSI Reference Model
• A demilitarized zone (DMZ) is used by a majority of firewall systems to guard assets and resources.
• DMZ’s are deployed to give external users access to resources like e-mail servers, DNS servers, and
web pages without uncovering the internal network.
• It behaves as a buffer between distinctive segments in the network.
• For permitting the traffic to move from a lower security level to a higher security level, one should
be precise about the kind of traffic permitted. By being precise we are unlocking the firewall system
only for that traffic which is essential, all other kinds of traffic will be blocked by configuration.
Firewall enable/service/rules…
• A firewall is a network security device, either hardware or
software-based, which monitors all incoming and outgoing traffic and
based on a defined set of security rules accepts, rejects, or drops that
specific traffic.
• Firewall-cmd --add-port=80/tcp
• Firewall-cmd –list-all
To block incoming traffic from an IP
• Firewall-cmd –add-rich-rule=‘rule family=“ipv4” source
address”192.168.0.0” reject’
To block outgoing traffic to a IP or URL
• Firewall-cmd --direct --add-rule=ipv filter OUTPUT 0 –d <IP> -j DROP
• Application layer firewall can inspect and filter the packets on any OSI
layer, up to the application layer.
• It has the ability to block specific content, also recognize when certain
application and protocols (like HTTP, FTP) are being misused.
• In other words, Application layer firewalls are hosts that run proxy
servers.
• A proxy firewall prevents the direct connection between either side
of the firewall, each packet has to pass through the proxy.
6. Next Generation Firewalls (NGFW)
• This works as the Sessions layer of the OSI Model’s . This allows for
the simultaneous setup of two Transmission Control Protocol (TCP)
connections. It can effortlessly allow data packets to flow without
using quite a lot of computing power. These firewalls are ineffective
because they do not inspect data packets; if malware is found in a
data packet, they will permit it to pass provided that TCP connections
are established properly.
References…
• https://www.softwaretestinghelp.com/firewall-security/
• https://networklessons.com/cisco/asa-firewall/introduction-to-firew
alls
• https://www.javatpoint.com/firewall#:~:text=How%20does%20a%20
firewall%20work,that%20is%20configured%20to%20accept.
• https://www.geeksforgeeks.org/introduction-of-firewall-in-computer
-network/