A proxy firewall operates at what layer of the open system interconnection (osi) model?

A proxy server, also known as a "proxy" or "application-level gateway", is a computer that acts as a gateway between a local network (for example, all the computers at one company or in one building) and a larger-scale network such as the internet. Proxy servers provide increased performance and security. In some cases, they monitor employees' use of outside resources.

A proxy server works by intercepting connections between sender and receiver. All incoming data enters through one port and is forwarded to the rest of the network via another port. By blocking direct access between two networks, proxy servers make it much more difficult for hackers to get internal addresses and details of a private network.

Some proxy servers are a group of applications or servers that block common internet services. For example, an HTTP proxy intercepts web access, and an SMTP proxy intercepts email. A proxy server uses a network addressing scheme to present one organization-wide IP address to the internet. The server funnels all user requests to the internet and returns responses to the appropriate users. In addition to restricting access from outside, this mechanism can prevent inside users from reaching specific internet resources (for example, certain websites). A proxy server can also be one of the components of a firewall.

Proxies may also cache web pages. Each time an internal user requests a URL from outside, a temporary copy is stored locally. The next time an internal user requests the same URL, the proxy can serve the local copy instead of retrieving the original across the network, improving performance.

Note:

Do not confuse a proxy server with a NAT (Network Address Translation) device. A proxy server connects to, responds to, and receives traffic from the internet, acting on behalf of the client computer, while a NAT device transparently changes the origination address of traffic coming through it before passing it to the internet.

For those who understand the OSI (Open System Interconnection) model of networking, the technical difference between a proxy and a NAT is that the proxy server works on the transport layer (layer 4) or higher of the OSI model, whereas a NAT works on the network layer (layer 3).

This is document ahoo in the Knowledge Base.
Last modified on 2018-11-15 11:25:00.

Firewalls

Dr.Errin W. Fulp, in Managing Information Security (Second Edition), 2014

Application Layer Firewalls

Application layer firewalls can filter traffic at the network, transport, and application layer. Filtering at the application layer also introduces new services, such as proxies. Application proxies are simply intermediaries for network connections. Assume that a user in the internal network wants to connect to a server in the external network. The connection of the user would terminate at the firewall; the firewall would then create a connection to the Web server. It is important to note that this occurs seamlessly to the user and server.

As a result of the proxy the firewall can potentially inspect the contents of the packets, which is similar to an intrusion detection system (IDS). This is increasingly important since a growing number of applications, as well as illegitimate users, are using nonstandard port numbers to transmit data. Application layer firewalls are also necessary if an existing connection may require the establishment of another connection—for example, the Common Object Resource Broker Architecture (CORBA).

Increasingly, firewalls and other security devices are being merged into a single device that can simplify management. For example, an intrusion prevention system (IPS) is a combination firewall and IDS. An IPS can filter packets based on the header, but it can also scan the packet contents (payload) for viruses, spam, and certain types of attacks.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124166882000064

Stalking the Competition: How ISA 2004 Stacks Up

Dr.Thomas W. Shinder, Debra Littlejohn Shinder, in Dr. Tom Shinder's Configuring ISA Server 2004, 2005

Comparing ISA 2004 to Other Firewall Products

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Microsoft defines ISA Server 2004 as “an advanced application layer firewall, VPN, and Web cache solution that enables customers to easily maximize existing IT investments by improving network security and performance.”

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004 includes the following key features: multi-layer inspection, advanced application layer filtering, secure inbound traffic and protection from “inside attacks” via VPN client connections, integrated multi-networking capabilities, network templates, and stateful routing and inspection.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004's ease of use features include: simple, easy to learn and use management tools; prevention of network access downtime; savings on bandwidth costs; integration with Windows Active Directory, third party VPN solutions and other existing infrastructure; a thriving community of partners, users and Web resources.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004's high-performance features include: ability to provide fast, secure anywhere/anytime access; a safe, reliable and high-performance infrastructure; an integrated single-server solution; a way to scale out the security infrastructure; enhanced network performance, and reduced bandwidth costs.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004 is a software firewall, which can be installed on Windows 2000 Server (with Service Pack 4 or above) or Windows Server 2003. Internet Explorer 6, or later, must be installed.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server is reliable, scalable, and extensible, and supports high availability through the Windows Server 2003 Network Load Balancing (NLB) service.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server offers compatibility and interoperability with Active Directory, with Exchange server and other Microsoft Server System products, and in a mixed network environment.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004 provides administrators with a friendly graphical interface that not only has many advantages over most of its competitors, but also is a big improvement over the ISA Server 2000 interface.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004 provides remote management capability through the ISA Server management console and the Remote Desktop Protocol (RDP).

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004 provides improved logging and reporting through the dashboard, alerts, the sessions panel, connectivity monitors, the report configuration wizard, and the ability to view connection information in real time.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

One of the major strengths of ISA Server 2004 is its ability to perform application layer filtering (ALF). The application layer filtering feature allows the ISA Server 2004 firewall to protect against attacks that are based on weaknesses or holes in a specific application layer protocol or service.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004 includes the following features that set it apart from the competition: secure Exchange RPC filter, link translation filter, and the OWA forms-based filter.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004 includes a collection of intrusion detection filters that are licensed from Internet Security Systems (ISS). These intrusion detection filters are focused on detecting and blocking network layer attacks. In addition, ISA Server 2004 includes intrusion detection filters that detect and block application layer attacks.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004 supports the following VPN protocols: Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol/IPSec (L2TP/IPSec), and IPSec Tunnel Mode.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

The ISA Server 2004 VPN feature supports two types of VPN connections: Remote Access VPN and Site-to-site VPN.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

The ISA Server 2004 VPN quarantine feature increases the security of VPN client connections by “pre-qualifying” VPN clients before they are allowed to connect to the corporate network.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

In addition to ISA Server 2004's firewall and VPN features, the ISA Server 2004 firewall can also act as a Web proxy server. The ISA Server 2004 machine can be deployed as a combined firewall and Web-caching server, or as a dedicated Web-caching server.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

ISA Server 2004 supports forward and reverse caching, and multiple ISA servers can be configured to use distributed and hierarchical caching.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Check Point's add-on modules have to be purchased at extra cost, in many cases for functionality that is included at no extra charge with ISA Server.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Check Point includes no Web-caching functionality; this must be added as an off-box solution or via add-on modules.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Check Point's SecureClient software costs extra, and is needed to add VPN client configuration verification, similar to ISA Server's VPN quarantine feature that is included at no extra cost.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Cisco PIX requires add-on third party products to provide functionalities such as deep content inspection that are included with ISA Server at no cost.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Cisco PIX includes no Web caching functionality; this must be added by purchasing a Cisco Content Engine or a third-party caching solution.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Enforcement of VPN configuration policy for PIX requires the proprietary Cisco Secure VPN client v3.x or above.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

NetScreen requires that additional appliances or third party products be purchased to provide functionalities included with ISA Server (more sophisticated intrusion detection/deep content inspection, caching).

A proxy firewall operates at what layer of the open system interconnection (osi) model?

NetScreen uses a proprietary VPN client or security client (which includes personal firewall) that must be purchased at extra cost.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

VPN configuration enforcement with NetScreen only enforces client firewall policy.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

SonicWall requires that additional appliances or third-party products be purchased to provide functionalities included with ISA Server (more sophisticated intrusion detection/deep content inspection, caching).

A proxy firewall operates at what layer of the open system interconnection (osi) model?

NetScreen uses a proprietary VPN client that must be purchased at extra cost.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Downloading of client configuration data from VPN gateway requires security client.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

WatchGuard does not include application proxies on its low cost models. ALF includes only HTTP, FTP, DNS.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

WatchGuard provides no Web-caching functionality. Cost of adding a caching solution must be factored in when comparing cost with ISA server.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

WatchGuard uses proprietary remote VPN client software that must be purchased at extra cost.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Symantec requires that additional appliances or third party products be purchased to provide functionalities included with ISA Server (more sophisticated intrusion detection/deep content inspection, caching).

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Symantec provides no Web-caching functionality. Cost of adding a caching solution must be factored in when comparing cost with ISA server.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Symantec uses proprietary remote VPN client software that must be purchased at extra cost.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Blue Coat is the only one of ISA Server 2004's major competitors that includes Web-caching functionality.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Blue Coat does not include site-to-site VPN gateway or remote access VPN functionality.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Blue Coat requires that content filtering be done through a third-party service.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Open source firewalls are more popular with highly technical individuals (such as hackers) and those who advocate and are familiar with open source operating systems.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

The cost advantage of open source firewalls is often offset by difficulty of use, lack of documentation, lack of technical support, and weak or missing logging and alerting features.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

IPChains provides rudimentary firewall functionality and does not include services usually taken for granted in commercial firewall products such as ALF, VPN gateway, IDS, and others.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

The Juniper Firewall ToolKit was developed by Obtuse Systems to run on Linux and BSD/FreeBSD. It was based on ipfirewall and offered as a toolkit for building proxy firewalls.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

Ipfirewall is a kernel packet filter that comes with FreeBSD. It performs network-layer packet filtering only; application-layer filtering must be done by another program/service.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

IPCop is a user-friendly firewall that runs on Linux and is managed from a Web UI, thus it can be managed remotely. It includes NAT functionality to protect a small LAN. It is based on the Smoothwall code and licensed under the GNU GPL. The firewall is based on ipchains.

A proxy firewall operates at what layer of the open system interconnection (osi) model?

IPCop was designed for home and SOHO users rather than enterprise-level networks.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781931836197500101

Offensive Tactics

Alijohn Ghassemlouei, ... Russ Rogers, in The Hacker's Guide to OS X, 2013

Data Gathering and Extraction

As an attacker it’s great to get root access to a system, high-fives and handshakes will surely ensue in dimly lit rooms for a particularly good prize, but that is only the mid-point in our quest. Once we’re on a system we must think of ways to gather data quickly as we may not be on the system long; our connection could break, the computer could drop the process we’re in, or we could be discovered.

At the heart of the matter there are only a few directories (which we have looked at in other Chapters) that matter to us, the main ones being the home directories of the users and the other being to dump password files for cracking. These two main directories are usually then extracted to our attacking system to be mulled over to find more password or other possible directories where information is being stored on the local machine or on the network.

Though a question remains as to what to do to get this information off the system we’re attacking. So we’ve copied all of our “acquired” data into once place and we’ve packaged it up into a tar ball (.tar.gz file) and we’re waiting to exfiltrate it, but we run into an issue, we can’t communicate directly to our machine as that would be a bit too obvious if we just FTP the data to ourselves.

In most home user environments you can move around large files and the user would be none the wiser as most users lack the utilities to detect data exfiltration. In corporate environments we’ve discovered that even if they have a million dollars worth of sensors in place, odds are it’s not being watched very well for anomalous data transfer into and out of the environment, but there are always exceptions.

Let’s take some time and look at a few of the technologies that could be hindering our progress (in a corporate environment) or ways that we can remain discreet.

Local Firewall—In the case of the local OS X firewall we must look at it from the prospective of its purpose. It is a basic (very basic) rule based application layer firewall. It is meant to keep the system “hidden” on the network and only permit communication to and from the system from authorized applications and listening services. The great part about already being on the system is that we can do a few things to the firewall; add our own authorized applications, use one that is on the trusted apps list, or just turn the firewall off.

List Trusted Applications: /usr/libexec/ApplicationFirewall/socketfilterfw --listapps /Applications/another.app

Add Application: /usr/libexec/ApplicationFirewall/socketfilterfw --add /Applications/another.app

Remove Application: /usr/libexec/ApplicationFirewall/socketfilterfw --remove /Applications/another.app

Unblock an application: /usr/libexec/ApplicationFirewall/socketfilterfw --unblockapp /Applications/another.app

Kill firewall: /usr/libexec/ApplicationFirewall/socketfilterfw --setglobalstate off

Remember the goal is to be stealthy so use the least noticeable tactic first, like see if they have IRC, Skype, AIM, or some other program capable of file transfer added to the firewall trusted applications list to be able to get your files out with. If you wish to look at the other commands in socketfilterfw you can use the -h option.

Corporate Firewall—Unless there is something seriously wrong with the corporate firewall you will most likely not be able to manipulate it in the same way that you are able to manipulate the local firewall. Good news for you though, most corporate firewalls are designed to keep people out, not keep data in. What is means is that if you are having trouble getting your data out on non-standard ports, switch to standard traffic ones such as 22 (SSH), 80(HTTP), and 443(HTTPS).

If that does not work, set up a listener on your internet facing system and attempt to make connections to it to find an open port on the firewall. If, on the other hand, they let traffic out on port 22, jump for joy and SCP the data from your target to your dummy box in the aether. Never send traffic directly back to yourself if you are attempting to be stealthy, you could get yourself blocked if they find you.

Outbound Proxy—You’ve run into a situation where you have tried to get out on 22, but the firewall will not let you. You’ve tried to send data across 80 and 443, but the packet filtering firewall recognizes those are not Web requests or it will not allow outbound connects and forces you to go to the proxy. There are couple alternatives here we can use to possibly get the data out, we could attempt to send our traffic over port 53 (DNS) or we could setup a “legitimate” Website and upload our file over SSL to it.

While setting up a Website to upload a file is achievable without too much difficulty, sending a file over port 53 and disguising it as DNS traffic would require an effort beyond the scope of this book, fear not though, we have an option for DNS. For DNS you can look at a tool (set of scripts) like OzymanDNS by Dan Kaminsky. A great tutorial is available by Andreas Gohr (http://www.splitbrain.org/blog/2008-11/02-dns_tunneling_made_simple).

The moral of the story when it comes to exfiltration of data is to be quietly persistent. There will almost always be a hole in the armor somewhere or some process you can access that will allow you to send data outbound at a given time during the day (like normal work hours). Understanding your target’s business processes (where possible) is a great way to discover faults in those processes to leverage against them.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597499507000071

Security Standards and Services

Naomi J. Alpern, Robert J. Shimonski, in Eleventh Hour Network+, 2010

Firewalls

A firewall blocks access to an internal network from outside and blocks users of the internal network from accessing potentially dangerous external networks or ports. There are three distinct firewall technologies:

Packet filtering A network layer firewall or packet-filtering firewall works at the network layer of the Open Systems Interconnection (OSI) model and can be configured to deny or allow access to specific ports or Internet Protocol (IP) addresses. It is designed to operate rapidly by either allowing or denying packets simply based on source and destination IP address and port information. This is the simplest and fastest form of traffic-filtering firewall technologies.

It works in two directions: to keep intruders at bay and to restrict access to the external network from internal users.

Two distinct firewall base policies are as follows:

Allow by default – it allows all traffic to pass through the firewall except traffic that is specifically denied.

Deny by default – it blocks all traffic from passing through the firewall except for traffic that is explicitly allowed.

Ports 0 through 1023 are considered well-known ports. These ports are used for specific network services and should be considered the only ports allowed to transmit traffic through a firewall.

Ports outside the range of 0 through 1023 are either registered ports or dynamic/private ports.

User ports range from 1024 to 49,151.

Dynamic/private ports range from 49,152 to 65,535.

Since only the header of a packet is examined, a packet-filtering firewall has speed.

There are two major drawbacks to packet filtering:

A port is either open or closed.

It does not understand the contents of any packet beyond the header.

Stateful inspection Stateful inspection operates at the network and the transport layers of the OSI model, but it has the ability to monitor state information regarding a connection. In effect, when a connection is established between two hosts, the firewall will initially determine if the connection is allowable based on a set of rules about source and destination ports and IP addresses. Once the connection is deemed to be acceptable, the firewall remembers this. Therefore, subsequent traffic can be examined as either permissible or not within the context of the entire session. It then functions by checking each packet to verify that it is an expected response to a current communications session.

Application-layer gateways They are also called as application-layer gateway devices or application filtering. Application-layer gateways are more advanced than packet filtering, operate at the application layer of the OSI model, and examine the entire packet to determine what should be done with the packet based on specific defined rules. They use complex rules to determine the validity of any given packet, and part of analyzing each packet includes verifying that it contains the correct type of data for the specific application it is attempting to communicate with.

The drawbacks to application-layer gateway technology are as follows:

Application-layer gateways are much slower than packet filters.

A limited set of application rules are predefined and any application not included in the predefined list must have custom rules defined and loaded into the firewall.

Application-layer gateways must then rebuild packets from the top down and send them back out. This breaks the concept behind the client/server architecture and slows the firewall down even further.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597494281000084

Other Uses of Runtime Modification

Erez Metula, in Managed Code Rootkits, 2011

Defense in Depth

The runtime can be the subject of a defense-in-depth approach, by deploying an additional layer of security inside it.

For instance, we can add a security layer to the runtime that can perform tasks such as input validation, auditing and logging, and output encoding (such as HTML encoding as cross-site scripting and other HTML injection-based attack mitigation).

This “embedded application layer firewall” has some advantages that are not usually provided by a WAF, since it can operate from the inside and has access to internal runtime variables and state that are not exposed to the outside. It can also make fine-grained decisions based on the application's internal state that an external box cannot make, as it has a shallow view of each request by just observing the data sent to the application. In addition, it can also be used to protect against business logic attacks, which is the major weakness for most WAFs.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597495745000106

Firewalls

Dr.Errin W. Fulp, in Computer and Information Security Handbook (Second Edition), 2013

2 Contents

1.

Introduction

2.

Network Firewalls

3.

Firewall Security Policies

Rule-Match Policies

4.

A Simple Mathematical Model for Policies, Rules, and Packets

5.

First-Match Firewall Policy Anomalies

6.

Policy Optimization

Policy Reordering

Combining Rules

Default Accept or Deny?

7.

Firewall Types

Packet Filter

Stateful Packet Firewalls

Application Layer Firewalls

Nation-State Backed

8.

Host and Network Firewalls

9.

Software and Hardware Firewall Implementations

10.

Choosing the Correct Firewall

11.

Firewall Placement and Network Topology

Demilitarized Zones

Perimeter Networks

Two-Router Configuration

Dual-Homed Host

Network Configuration Summary

12.

Firewall Installation and Configuration

13.

Supporting Outgoing Services through Firewall Configuration

Forms of State

Payload Inspection

14.

Secure External Services Provisioning

15.

Network Firewalls for Voice and Video Applications

Packet Filtering H.323

16.

Firewalls and Important Administrative Service

17.

Protocols

Routing Protocols

Internet Control Message Protocol

Network Time Protocol

Central Log File Management

Dynamic Host Configuration Protocol

18.

Internal IP Services Protection

19.

Firewall Remote Access Configuration

20.

Load Balancing And Firewall Arrays

Load Balancing in Real Life

How to Balance the Load

Advantages and Disadvantages of Load Balancing

21.

Highly Available Firewalls

Load Balancer Operation

Interconnection of Load Balancers and Firewalls

22.

Firewall Management

23.

Summary

24.

Chapter Review Questions/Exercises

True/False

Multiple Choice

Exercise

Hands-On Projects

Case Projects

Optional Team Case Project

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123943972001069

Detecting System Intrusions

Scott R. Ellis, in Computer and Information Security Handbook (Third Edition), 2017

Distribution Layer

Distribution acts as the boundary surface between Core and Access. One oversimplification would be to say that distribution allows for the aggregation and centralization of key distribution components. It reduces the complexity of the network.

Core is the simplest. It provides critical connectivity services and is typically designed to be highly available and always on. Redundancy is an important component of this. Its mission is to provide redundancy, isolation, and backbone connectivity. Typical L3 equipment includes items such as 24-and 48-port switches, and wireless access points.

The diagram in Fig. 5.13 attempts to demonstrate the looseness of some (most) modern networks. This diagram is in stark contrast to typical network diagrams, which often show a single point of access for all systems, connecting them to the Internet. This connected space5 model layers firewalls in a ring, or a sphere (like a run-about ball) wrapped around your network, but only some spheres converge and are placed in more vulnerable positions than others. Multiple trusts may exist that have intrusive rights and weak passwords. It is, of course, not really a sphere, but it is easier to think about it that way. The four-tiered model6 describes:

1.

A perimeter-based firewall

2.

A demilitarized zone (DMZ)

3.

A wireless zone

4.

All internal switches

Over the past few decades, networks have been transforming. DMZ? “Too much trouble to maintain,” said the IT technicians and their managers. “Modern firewalls are more than enough to protect us from internal threats,” said the IT directors and doers of the time. Besides, they would say, once a DMZ is compromised, they [the hackers] are practically inside. It is just a matter of time. There is some truth in this. As you can see in Fig. 5.13, what protection does the firewall give to the dual-homed host in the employee's pocket? Or to the hacker in the coffee shop across the street, who has accessed via the wireless, using a password he picked up from a conference room whiteboard? Modern networks are multiplexed composites of the four-tiered network. Tapping them? Do your best. The more structure, the better adherence to the four-tiered model that you can get, the stronger and more thorough your taps will be. Legitimate tap products are best. Your tap network should be 100% segregated from the business network. It should be undetectable to anyone on the network.

Traditional thinking is that wireless networks should be treated as untrusted, should connect only via virtual private networks, and should use two-factor authentication. In the military, such edicts could easily be issued. In a modern workplace, such dictatorial viewpoints will bump up against looser styles of networking, and where CISO and CIO philosophies may clash. Many employees do not perceive a difference between authoritarianism and limited wireless network connectivity. Furthermore, in this current climate and age of unrestricted computing, what is to stop me from tethering my computer to my cell phone and using it as the Internet, creating a portal on the network that cannot be seen?. And although most breaches may not come from “the inside,” enough do that we need to worry about new devices appearing on our network as well, or the ability of users to attach computers to unknown or unregistered networks. Logging and tracking of events such as this can be done in a security paradigm such as this, but are outside of the scope of this chapter.

If you are fortunate, you will find a network that is well-organized and planned and follows Best Practices. An efficient network reduces the number of connections necessary through by using additional core equipment.

If your topology (your networking infrastructure) matches that of a bird's nest, deploying successful sensor instrumentation will be expensive and it can be difficult to assess placement. A simpler architecture will be (1) less expensive, and (2) cheaper and easier to tap.

Exercise

Does it make sense to tap on the perimeter (outside the firewall)? In the modern day of scanless attacks, and sheer quantity of attacks, does it lend useful insights to see what attacks are being leveled against a corporate firewall? What are the pros and cons, and how would the information be leveraged?

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128038437000053

Editor’s Preface

E. Griffor, in Handbook of System Safety and Security, 2017

Chapter 9: A Design Methodology for Developing Resilient Cloud Services—Cihan Tunc, Salim Hariri, and Abdella Battou

Cloud Computing is emerging as a new paradigm that aims to deliver computing as a utility. For the cloud computing paradigm to be fully adopted and effectively used, the authors argue that it is critical that the security mechanisms are robust and resilient to malicious faults and attacks. Security in cloud computing is of major concern and a challenging research problem since it involves many interdependent tasks, including application layer firewalls, configuration management, alert monitoring and analysis, source code analysis, and user identity management. It is widely accepted that one cannot build software and computing systems that are free from vulnerabilities and cannot be penetrated or attacked. Therefore it is widely accepted that cyber resilient techniques are the most promising solutions to mitigate cyberattacks and to change the game to the advantage of the defender over the attacker.

Moving Target Defense (MTD) has been proposed as a mechanism to make it extremely difficult for an attacker to exploit existing vulnerabilities by varying the attack surface of the execution environment. By continuously changing the environment (e.g., software versions, programming language, operating system, connectivity, etc.), we can shift the attack surface and, consequently, evade attacks.

In this chapter the authors present a methodology for designing resilient cloud services that is based on redundancy, diversity, shuffling, and autonomic management. Redundancy is used to tolerate attacks if any redundant version or resource is compromised. Diversity is used to avoid the software monoculture problem where one attack vector can successfully attack many instances of the same software module. Shuffling is needed to randomly change the execution environment and is achieved by “hot” shuffling of multiple functionally equivalent, behaviorally different software versions at runtime. The authors also present their experimental results and evaluation of the RCS design methodology. Their experimental results show that their proposed environment is resilient against attacks with less than 7% in overhead time.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128037737000012

Introduction to Intrusion Detection Systems

In Cisco Security Professional's Guide to Secure Intrusion Detection Systems, 2003

The E-Commerce Module

The E-Commerce Module is intended to house and protect the business-driving public infrastructure of the organization and includes database, application, and web services components, among others. To provide a comprehensive defense, the SAFE blueprint calls for focused Layer 4–7 IDS analysis and Host IDS capabilities. Furthermore, multitiered stateful inspection firewalls and packet-filtering devices are included for perimeter defense. Wire speed switching on VLAN-capable switches provides server connectivity in the E-Commerce Module for fast, efficient server access.

The Corporate Internet Module

The Corporate Internet Module provides secure connectivity for internal corporate users to the Internet. It also offers logical space for inbound and outbound services such as SMTP, web proxy, and content inspection servers. This business functionality is protected with stateful inspection firewalls, Layer 7 filtering, spoof mitigation, and other basic filtering. It also includes advanced and focused Network IDS analysis and host-based detection systems.

The VPN/Remote Access Module

Due to the potential size and scaling requirements of Enterprise-sized VPN solutions, the Enterprise Network Edge Area includes a VPN/Remote Access module. This module contains the required encryption, VPN termination points, and authentication mechanisms for the Enterprise environment. Included in this module are various IDS components that are placed at the encryption endpoint to inspect inbound and outbound VPN traffic. Stateful inspection firewalls are also integrated into the VPN/Remote Access Module for perimeter security from, and to, remote connections.

The Extranet Module

The Extranet Module is similar to the E-Commerce Module in that it houses application and web-based services. Extranets are typically intended to facilitate access by semi-trusted users such as partners or other remote entities. Like the E­Commerce Module, the Extranet Module includes NIDS and HIDS, as well as stateful inspection firewalls. It also includes authentication and VPN termination services for remote use.

The WAN Module

The Enterprise Network Edge WAN Module includes sparse security features to facilitate efficient network transport. The WAN Module may include Layer 3 access control mechanisms for secure transport.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781932266696500215