Unit-5(Firewall and Intrusion)
Unit-5(Firewall and Intrusion)
• This can involve exploiting vulnerabilities, bypassing security measures, or using malicious techniques to gain access.
• Intrusions can compromise sensitive data, disrupt operations, and lead to significant financial and reputational damage.
• A firewall is a network security device, either hardware or software-based, which monitors all incoming and
outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that specific traffic.
• A firewall is a network security device or software that monitors and controls incoming and outgoing traffic
based on predefined security rules. It acts as a barrier between a trusted internal network and untrusted
external networks (e.g., the internet).
Packet Inspection:
Stateless Firewalls: Inspect individual packets independently.
Stateful Firewalls: Track the state of active connections and make filtering decisions based on the context of the traffic
flow.
Access Control:
Firewalls define access control policies, determining which devices or users can access specific resources.
They block unauthorized access attempts.
However, these firewalls don't route packets; rather, they compare each packet received to
a set of established criteria, such as the allowed IP addresses, packet type, port number and
other aspects of the packet protocol headers.
Packets flagged as troublesome are not forwarded and, thus, cease to exist.
Because traffic filtering is based entirely on IP address or port information, packet filtering
lacks broader context that informs other types of firewalls.
Larger enterprises can also use packet filtering as part of a layered defense to
screen potentially harmful traffic between internal departments.
2. Circuit-level gateway
Using another relatively quick way to identify malicious content, circuit-level gateways
monitor TCP handshakes and other network protocol session initiation messages across the
network as they are established between the local and remote hosts to determine whether
the session being initiated is legitimate -- meaning, whether the remote system is considered
trusted.
•If they aren't used in conjunction with other security technology, circuit-level gateways offer no protection against
data leakage from devices within the firewall.
While circuit-level gateways provide a higher level of security than packet filtering firewalls, organizations should
use them in conjunction with other systems.
For example, circuit-level gateways are typically used alongside application-level gateways. This strategy
combines attributes of packet- and circuit-level gateway firewalls with content filtering.
3. Application-level gateway
This kind of device -- technically a proxy and sometimes referred to as a proxy firewall -- functions as the only
entry point to and exit point from the network.
Application-level gateways filter packets not only according to the service for which they are intended -- as
specified by the destination port -- but also by other characteristics, such as the HTTP request string.
While gateways that filter at the application layer provide considerable data security, they can
dramatically affect network performance and can be challenging to manage.
Provides fine-grained security controls that can, for example, allow access to a website but restrict which pages
on that site the user can open.
Application-level firewalls are best used to protect enterprise resources from web application threats. They block
access to harmful sites and prevent sensitive information from being leaked from within the firewall. They can,
however, introduce a delay in communications.
Firewall Architectures
This setup prevents direct communication between the two networks, forcing all traffic to pass through the firewall.
A dual-homed host is an application-based firewall that protects trusted networks (e.g., a corporate network) from
malicious traffic.
It monitors all network traffic from untrusted networks (like the internet) and acts as the first line of defense, ensuring
that no malicious traffic can enter.
The term “dual-homed host” can be used to define any gateway, firewall, or proxy that provides secure services or
applications to an untrusted network.
How a dual-homed host works
This system sits between an untrusted network and a trusted network to ensure secure access.
The dual-homed host is connected to the untrusted network (e.g., the internet) and the trusted network (e.g., internal) at the
same time.
With a dual-homed host, IP packets are not directly routed from an untrusted network to the trusted network.
The systems inside the firewall and outside the firewall (on the internet) can communicate with the dual-homed host, but
they can’t communicate directly with each other.
2. Screened Host Architecture
A screened host firewall is a firewall architecture that uses a bastion host to filter and monitor traffic between an
internal network and an external network (typically the internet).
It provides an additional layer of security by placing the bastion host between an external router and an internal
network.
Bastion Host: A highly secured and hardened system that acts as a gateway between external and internal
networks.
Packet Filtering Router: Positioned between the external network and the bastion host to filter traffic based on
predefined rules.
Internal Network: Protected behind the bastion host to prevent direct access from external threats.
How It Works
The packet filtering router allows only certain types of traffic to reach the bastion host.
The bastion host further inspects and proxies the allowed traffic before forwarding it to the internal network.
The Screened Subnet Firewall Architecture, also known as DMZ (Demilitarized Zone) Architecture, is a firewall setup that
provides an additional layer of security by creating an isolated network (DMZ) between the internal network and the external
network (internet).
This setup protects sensitive internal resources while allowing controlled access to public-facing services like web servers and
email servers.
Architecture Overview
🔹 How It Works
2.Traffic Monitoring and Control – They regulate inbound and outbound traffic based on predefined security rules.
3.Protection Against Malware and Cyberattacks – Firewalls help prevent unauthorized access, DoS (Denial of Service) attacks,
and malware infiltration.
4.Access Control – They enforce security policies by restricting access to certain applications, websites, or services.
5.Logging and Monitoring – Firewalls provide logs of network activities, helping in forensic analysis and threat detection.
6.VPN Support – Many firewalls support Virtual Private Networks (VPNs) to secure remote access.
7.Data Loss Prevention – They help prevent sensitive data from being transmitted outside the network.
Limitations of a Firewall
1.Cannot Prevent Insider Threats – Firewalls do not stop malicious activities from authorized users within the network.
2.Limited Protection Against Zero-Day Attacks – New or unknown threats may bypass firewall defenses.
3.No Protection Against Social Engineering – Firewalls cannot stop phishing attacks, email fraud, or human-based
manipulation tactics.
6.Cannot Detect Encrypted Malware – Firewalls may struggle to analyze encrypted malicious traffic.
7.Cost of Implementation – Enterprise-grade firewalls can be expensive in terms of hardware, software, and maintenance.
Trusted Systems in Network
Security
• Trusted Systems are special systems designed to serve the purpose of
providing security.
• Safety is ensured by trusted system in a manner by protecting the
system against malicious software’s and third party intruders.
• Trusted system allow only verified users to access the computer
system.
• Trusted system are responsible for providing security at different
levels and based on different parameters.
Importance of Trusted System:
• Identity Verification: Trusted systems ensure that only verified users are given
access. The verification process takes place that each user is identified
uniquely.
• Safety Maintained: Trusted system ensures that safety is maintained by
preventing direct access to confidential information.
• Limiting Access: Permissions and access that are absolutely necessary are
granted for users. Unwanted rules and permissions are avoided.
• Preventing Malicious Activities: Trusted systems have a mechanism in place to
detect and prevent malicious activities such as hacking attempts and
unauthorized access.
• Ensuring Compliance: Trusted systems help organizations to comply with
various regulations and standards such as HIPAA, PCI-DSS, and SOX by providing
a secure environment for sensitive information.
Password Management in Cyber
Security
• In technical terms, it is a series of letters or numbers that you must
type into a computer or computer system in order to be able to use it.
• Since passwords are meant to keep the files and data secret and safe
so it is prevented the unauthorized access,
• password management refers to the practices and set of rules or
principles or standards that out must follow or at least try to seek
help from in order to be a good/strong password
• along with its storage and management for the future requirements.
Issues Related to Managing
Passwords:
• Login spoofing
• Sniffing attack
• Brute force attack
• Shoulder surfing attack
• Data breach
Methods to Manage Password:
• Strong and long passwords: A minimum length of 8 to 12 characters long, also
it should contain at least three different character sets (e.g., uppercase
characters, lowercase characters, numbers, or symbols)
• Password Encryption: Using irreversible end-to-end encryption is
recommended. In this way, the password remains safe even if it ends up in the
hands of cybercriminals.
• Multi-factor Authentication (MFA): Adding some security questions and a
phone number that would be used to confirm that it is indeed you who is trying
to log in will enhance the security of your password.
• Make the password pass the test: Yes, put your password through some testing
tools that you might find online in order to ensure that it falls under the strong
and safe password category.
• updating passwords frequently: Though it is advised or even made mandatory
to update or change your password as frequently as in 60 or 90 days.
Access control
Access control is a security mechanism that regulates who or what can view or use resources in a computing environment. It
ensures that only authorized users or systems can access specific data, applications, networks, or physical spaces.
1.Discretionary Access Control (DAC) – The owner of the resource decides who gets access. Example: File permissions in
Windows/Linux.
2.Mandatory Access Control (MAC) – Access is controlled by a central authority based on security classifications. Example:
Military systems.
3.Role-Based Access Control (RBAC) – Access is granted based on roles assigned to users. Example: A database admin has
more privileges than a regular user.
4.Attribute-Based Access Control (ABAC) – Access decisions are based on attributes (user, resource, environment). Example:
A system allowing access only from a specific IP address.
Objectives of Access Control
Access control aims to protect resources from unauthorized access and misuse. The key objectives include:
1.Confidentiality – Ensures that sensitive data and resources are accessible only to authorized users.
3.Availability – Ensures that authorized users can access resources when needed.
4.Identification & Authentication – Verifies the identity of users before granting access.
6.Accountability & Auditability – Tracks user activities and access attempts for monitoring and compliance.
7.Least Privilege Enforcement – Restricts access to the minimum required for users to perform their tasks.
Intrusion Detection System (IDS)
An Intrusion Detection System (IDS) is a security mechanism designed to detect unauthorized access, malicious activities, or
policy violations within a network or system.
An intrusion detection system (IDS) is an application that monitors network traffic and searches for known threats and
suspicious or malicious activity. The IDS sends alerts to IT and security teams when it detects any security risks and threats.
Firewall IDS
A firewall is a hardware and/or software which functions An Intrusion Detection System (IDS) is a software or
in a networked environment to block unauthorized hardware device installed on the network (NIDS) or host
access while permitting authorized communications. (HIDS) to detect and report intrusion attempts to the
network.
A firewall can block an unauthorized access to network An IDS can only report an intrusion; it cannot block it
(E.g. A watchman standing at gate can block a thief) (E.g. A CCTV camera which can alert about a thief but
cannot stop it)
A firewall cannot detect security breaches for traffic that IDS is fully capable of internal security by collecting
does not pass through it (E.g. a gateman can watch only information from a variety of system and network
at front gate. He is not aware of wall-jumpers) resources and analyzing the symptoms of security
problems
Firewall doesn’t inspect content of permitted traffic. (A IDS keeps a check of overall network
gateman will never suspect an employee of the company
)
Definition:
A Network-based IDS (NIDS) monitors and analyzes network traffic in real time to detect malicious activity. It
inspects packet flows and matches them against known attack signatures or anomalous behavior patterns.
How It Works:
Placed at critical points in the network, such as between a firewall and internal systems.
Uses signature-based detection (matching known attack patterns) and anomaly-based detection (identifying
deviations from normal traffic patterns).
Definition:
A Host-based IDS (HIDS) is installed on individual devices (hosts) to monitor and analyze system activity, including file
integrity, system logs, and process behavior.
How It Works:
•Installed on endpoints such as servers, desktops, or critical infrastructure devices.
•Monitors system logs, file integrity, running processes, and kernel activities.
•Uses signature-based detection to detect malware and behavior-based analysis to identify unusual system behavior.
Definition:
A Hybrid IDS combines both Network-based IDS (NIDS) and Host-based IDS (HIDS) to provide comprehensive security by
monitoring both network traffic and host activity.
How It Works:
•Uses HIDS on critical endpoints to monitor system logs, file integrity, and user activity.
•Correlates data from both NIDS and HIDS for improved threat detection and reduced false positives.
Detection Methods in Intrusion Detection Systems (IDS)
Anomaly-based Detection
Definition:
Anomaly-based detection (or behavior-based detection) uses statistical models, machine learning, or artificial intelligence to
identify deviations from normal system or network behavior.
How It Works:
This method does not rely on predefined attack patterns but instead flags any unusual behavior.
Example:
A normal user logs in from the same IP address daily. Suddenly, an attempt is made from a foreign country at 3 AM →
Anomaly detected!
A web server usually handles 50 requests per second. Suddenly, it receives 10,000 requests per second → Possible DDoS
attack detected.
Signature-based Detection
Definition:
Signature-based detection (also called pattern-matching detection) compares network traffic, system activity, or log data
against a database of known attack signatures (predefined patterns of malicious behavior). If a match is found, an alert is
triggered.
How It Works:
Example:
SQL Injection attack follows a predictable pattern (e.g., ' OR 1=1 -- in SQL queries). If an IDS detects such a
query, it flags it as an attack.
malware infection may involve a known sequence of system calls. If detected, the IDS alerts administrators.
Heuristic-based Detection
Definition:
Heuristic-based detection uses rule-based algorithms to identify suspicious behavior that deviates from normal patterns. It
is similar to anomaly detection but relies on predefined rules rather than learning from data.
How It Works:
Example:
•Rule 1: If a single user account fails to log in 10 times in 5 minutes, raise an alert → Possible brute-force attack.
•Rule 2: If a process modifies system files without user authorization → Possible rootkit attack.
Misuse-based Detection
Definition:
Misuse-based detection focuses on detecting known attack patterns and system misuse behaviors. It is a combination of
signature-based detection and rule-based heuristics.
How It Works:
•It monitors system activity and compares it with predefined misuse patterns.
Example:
•An employee accessing restricted files repeatedly without permission → Possible insider threat.
•A hacker trying to exploit an old vulnerability in a web application → IDS flags it as an attack.