SlideShare une entreprise Scribd logo
1  sur  16
Using Distributed Firewalls in
Securing LANs
OUTLINE
 Security Issues
 Firewalls
 Distributed Firewalls
 Architectural similarities of NES, ADF & EFW
 Stateful Clustered Security Gateway (CSG) Distributed Firewalls
 Components of the Stateful CSG
 IPsec
 Benefits and Drawbacks of Stateful CSG
 Conclusion
 References
Security Issues
Some security issues affecting LANs
are:
 Eavesdropping
 Denial of service (DoS)
 Repudiation
 Spoofing.
Network device vulnerabilities
 No support for update patches.
 Delay in release of update patches.
 User reluctance to install update
patches.
(Stallings and Stallings, 1999)
Firewalls
 A firewall is a network security system that monitors inflow and outflow of data
packets and analyses these packets based on security policies.
 It is a location for monitoring security–related events such as log audits and
alarms.
 It can serve as a platform for creating VPN using IPSec.
(Davis, 1995)
Some of the techniques used to control access and enforce security
policies are:
 Service Control
 Direction Control
 Behavior Control
Drawback of Firewalls
 Uses restricted topology of the network.
 It assumes inside users are trusted and does not protect network from internal
attacks that can bypass the firewall using dial out capabilities.
 Difficult to process certain protocols (FTP, Real-Audio, etc.)
 It does not give protection against the transfer of virus-infected programs or files.
 Single points of access make firewalls hard to manage
(Davis, 1995)
Distributed Firewalls
Distributed firewalls are mechanisms that enforce centrally managed security policies that are distributed to
endpoints, forming a distributed firewall system.
Design of distributed firewalls are based on three elements:
 Keynote – Firmato: A general policy language for defining security policies.
 Web Server: Mechanism to distribute security policies.
 IPSec: Security protocol that provides network level encryption.
Examples of Distributed Firewalls
 Network Edge Security (NES)
 Distributed Embedded Firewall (EFW)
 Automatic Distributed Firewall (ADF)
 Stateful Clustered Security Gateway (Stateful CSG)
(Ramsurrun and Soyjaudah, 2009)
Architectural similarities of NES, ADF & EFW
Distributed firewalls are intended to be tamper resistant
 Independent of the host operating system, being implemented on the host’s NIC.
 NIC’s are used to store and perform packet filtering and cryptographic variables and subsystem management.
 Uses the 3Com 3CR990 family of NIC cards.
 Managed by a central, protected policy server.
 Protects against IP Spoofing as the NIC is inaccessible.
 Audit reports are sent to the audit manager in the policy server in the event of firewall policy violations.
(Meredith, 2003)
Drawbacks of NES, ADF & EFW
 Large amount of Network traffic is generated due to heavy rate of audit messages.
 Due to the limited processing power and memory on the NIC, its packet filtering
capability is limited and the NIC can be overloaded by network traffic even when
small firewall rulesets are used
 High convergence time of the firewalls as every end-user host needs to be constantly
updated.
(Ramsurrun and Soyjaudah, 2009)
Stateful Clustered Security Gateway Distributed Firewalls
This architecture consists of multiple firewall nodes actively working in parallel
to filter network traffic, both internal and external.
(Ramsurrun and Soyjaudah, 2009)
Components of the Stateful CSG
 Policy Distributor- Receives and reads update
files created by the admin and distributes to
the specified IP address of the CSMs using
TCP protocol.
 CSM- Receives and reads updates files by the
csm_updatehandler() function , reconstructs it
to ensure that it is error free. Sends the
firewalls update to each of the CSG firewall
nodes using unicast TCP connection.
During transmission of the update files, data as
well as network security is achieved using a
security protocol - IPsec.
(Ramsurrun and Soyjaudah, 2009)
IPsec
 IPsec is an IP layered protocol that protects the sending and receiving of
cryptographically–protected packets of any kind, without any modification
(Alshamsi and Saito, 2005).
 In distribution of firewall policies from the policy distributor to CSMs and for
securing error reports and logs sent from the CSMs to the network admin in case
of policy update file errors, IPsec is utilized to protect this data.
(Ramsurrun and Soyjaudah, 2009)
Benefits of Stateful CSG
When CSG distributed firewall system is successfully implemented, the following
attacks are addressed:
 Insider attacks
 IP & MAC address spoofing
 Packet sniffing
 Denial of Service
In addition to the threat solved by Stateful CSG, some of the advantages of
implementing Stateful CSG over other distributed firewall schemes are summarized
in Table 1.
(Ramsurrun and Soyjaudah, 2009)
Characteristics EFW ADF NES Stateful CSG-base
Fine-grained security × × × ✔
Firewall tamper
resistance ✔ ✔ ✔ ✔
High scalability ✔ ✔ ✔ ✔
Anti-spoofing ✔ ✔ ✔ ✔
Anti-sniffing ✔ ✔ ✔ ✔
Low overall network load × × × ✔
Secure real-time ✔ ✔ ✔ ✔
Low convergence time × × × ✔
Low end-user host
processing strain ✔ ✔ ✔ ✔
Context knowledge × × × ×
(Ramsurrun and Soyjaudah, 2009)Table 1
 It is a capital intensive approach to implement, due to its hardware based architecture.
Drawback of Stateful CSG
Conclusion
 In this presentation, different security issues in LANs were reviewed and how these threats
are addressed by implementing a distributed firewall scheme.
 Different distributed firewall schemes were analysed and compared and then, we
highlighted a particular distributed firewall (Stateful CSG) and how it is being implemented
in securing LANs and its benefits.
 The implementation of a load balancing NIC to protect against load balancing rule tamper
by malicious end-user hosts.
References
Alshamsi, A. and Saito,T., 2005, March. A technical comparison of IPSec and SSL. In null (pp. 395-398). IEEE.
Davis, C. (1995). Firewall Consortium. Network Security, 1995(9), p.9.
Kahate, A. (2003). Cryptography and network security. New Delhi:Tata McGraw-Hill Pub.
Markham,T. and Payne, C., 2001, June. Security at the network edge: A distributed firewall architecture. In discex (p. 0279). IEEE.
Meredith, L.M., 2003, April. A summary of the autonomic distributed firewalls (ADF) project. In DARPA Information Survivability Conference and
Exposition, 2003. Proceedings (Vol. 2, pp. 260-265). IEEE.
Payne, C. and Markham,T., 2001, December. Architecture and applications for a distributed embedded firewall. In Computer Security Applications
Conference, 2001. ACSAC 2001. Proceedings 17th Annual (pp. 329-336). IEEE.
Ramsurrun,V. and Soyjaudah, K.M.S., 2009, January. A stateful CSG-based distributed firewall architecture for robust distributed security. In
Communication Systems and Networks andWorkshops, 2009. COMSNETS 2009. First International (pp. 1-10). IEEE.
Slideshare.net, (2016). Rationalization and Defense in Depth -Two Steps Closer to the Clouds. [online]Available at:
http://www.slideshare.net/OTNArchbeat/rationalization-and-defense-in-depth-two-steps-closer-to-the-clouds [Accessed 13 Jan. 2016].
Stallings, W. and Stallings, W. (1999). Cryptography and network security. Upper Saddle River, N.J.: Prentice Hall.

Contenu connexe

Tendances

A secure scheme against power exhausting
A secure scheme against power exhaustingA secure scheme against power exhausting
A secure scheme against power exhaustingjpstudcorner
 
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...Nexgen Technology
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)JIEMS Akkalkuwa
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects inVishnu Suresh
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALASaikiran Panjala
 
3g security analysis
3g security analysis3g security analysis
3g security analysisashrawi92
 
MetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data CenterMetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data CenterJuniper Networks
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]Anton Kaska
 
Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Fuad Khan
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Securityphanleson
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksIJMER
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADAcsandit
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network securityTrishla Thakur
 

Tendances (19)

A secure scheme against power exhausting
A secure scheme against power exhaustingA secure scheme against power exhausting
A secure scheme against power exhausting
 
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects in
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
3g security analysis
3g security analysis3g security analysis
3g security analysis
 
Implementation
ImplementationImplementation
Implementation
 
MetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data CenterMetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data Center
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]
 
152 ready eng
152 ready eng152 ready eng
152 ready eng
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Zonesec_ares
Zonesec_aresZonesec_ares
Zonesec_ares
 
Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor Networks
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
 

En vedette (20)

Contractor Licence 2012
Contractor Licence 2012Contractor Licence 2012
Contractor Licence 2012
 
Endo
EndoEndo
Endo
 
Sea Tac
Sea TacSea Tac
Sea Tac
 
Ek polo
Ek poloEk polo
Ek polo
 
Les sals d'alumini a l'abocador de Can Planas
Les sals d'alumini a l'abocador de Can PlanasLes sals d'alumini a l'abocador de Can Planas
Les sals d'alumini a l'abocador de Can Planas
 
Recommendation
RecommendationRecommendation
Recommendation
 
16
1616
16
 
Performance Task
Performance TaskPerformance Task
Performance Task
 
Les sals d'alumini al abocador de Can Planas (part 2)
Les sals d'alumini al abocador de Can Planas (part 2)Les sals d'alumini al abocador de Can Planas (part 2)
Les sals d'alumini al abocador de Can Planas (part 2)
 
6 a cuestionario resueltas
6 a cuestionario resueltas6 a cuestionario resueltas
6 a cuestionario resueltas
 
Transfondo misiones-mundiales-2
Transfondo misiones-mundiales-2Transfondo misiones-mundiales-2
Transfondo misiones-mundiales-2
 
Doc1.docx
Doc1.docxDoc1.docx
Doc1.docx
 
De a a z hélio ronaldo lemos g de gaiolão
De a a z hélio ronaldo lemos g de gaiolãoDe a a z hélio ronaldo lemos g de gaiolão
De a a z hélio ronaldo lemos g de gaiolão
 
F. van der Meulen & P.D. Jungerius 1989
F. van der Meulen & P.D. Jungerius 1989F. van der Meulen & P.D. Jungerius 1989
F. van der Meulen & P.D. Jungerius 1989
 
Presentation1
Presentation1Presentation1
Presentation1
 
DMP certificate
DMP certificateDMP certificate
DMP certificate
 
Dunes per prevenir els efectes del canvi climatic
Dunes per prevenir els efectes del canvi climaticDunes per prevenir els efectes del canvi climatic
Dunes per prevenir els efectes del canvi climatic
 
Minne toimipaikka kannattaa sijoittaa? Mistä asunto kannattaa ostaa? Analytii...
Minne toimipaikka kannattaa sijoittaa? Mistä asunto kannattaa ostaa? Analytii...Minne toimipaikka kannattaa sijoittaa? Mistä asunto kannattaa ostaa? Analytii...
Minne toimipaikka kannattaa sijoittaa? Mistä asunto kannattaa ostaa? Analytii...
 
Elena forest ecosystem
Elena forest ecosystemElena forest ecosystem
Elena forest ecosystem
 
Platjadepalma
PlatjadepalmaPlatjadepalma
Platjadepalma
 

Similaire à Securing LANs with Distributed Firewalls

Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentationUshnish Chowdhury
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxannettsparrow
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
 
A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...csandit
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityslametarrokhim1
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
 
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Ericsson
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 

Similaire à Securing LANs with Distributed Firewalls (20)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
FY 2017 project version 2
FY 2017 project version 2FY 2017 project version 2
FY 2017 project version 2
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
Security sdn
Security sdnSecurity sdn
Security sdn
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
 
A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided securityNetwork Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided security
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
V cnsms
V cnsmsV cnsms
V cnsms
 

Dernier

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Dernier (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Securing LANs with Distributed Firewalls

  • 1. Using Distributed Firewalls in Securing LANs
  • 2. OUTLINE  Security Issues  Firewalls  Distributed Firewalls  Architectural similarities of NES, ADF & EFW  Stateful Clustered Security Gateway (CSG) Distributed Firewalls  Components of the Stateful CSG  IPsec  Benefits and Drawbacks of Stateful CSG  Conclusion  References
  • 3. Security Issues Some security issues affecting LANs are:  Eavesdropping  Denial of service (DoS)  Repudiation  Spoofing. Network device vulnerabilities  No support for update patches.  Delay in release of update patches.  User reluctance to install update patches. (Stallings and Stallings, 1999)
  • 4. Firewalls  A firewall is a network security system that monitors inflow and outflow of data packets and analyses these packets based on security policies.  It is a location for monitoring security–related events such as log audits and alarms.  It can serve as a platform for creating VPN using IPSec. (Davis, 1995) Some of the techniques used to control access and enforce security policies are:  Service Control  Direction Control  Behavior Control
  • 5. Drawback of Firewalls  Uses restricted topology of the network.  It assumes inside users are trusted and does not protect network from internal attacks that can bypass the firewall using dial out capabilities.  Difficult to process certain protocols (FTP, Real-Audio, etc.)  It does not give protection against the transfer of virus-infected programs or files.  Single points of access make firewalls hard to manage (Davis, 1995)
  • 6. Distributed Firewalls Distributed firewalls are mechanisms that enforce centrally managed security policies that are distributed to endpoints, forming a distributed firewall system. Design of distributed firewalls are based on three elements:  Keynote – Firmato: A general policy language for defining security policies.  Web Server: Mechanism to distribute security policies.  IPSec: Security protocol that provides network level encryption. Examples of Distributed Firewalls  Network Edge Security (NES)  Distributed Embedded Firewall (EFW)  Automatic Distributed Firewall (ADF)  Stateful Clustered Security Gateway (Stateful CSG) (Ramsurrun and Soyjaudah, 2009)
  • 7. Architectural similarities of NES, ADF & EFW Distributed firewalls are intended to be tamper resistant  Independent of the host operating system, being implemented on the host’s NIC.  NIC’s are used to store and perform packet filtering and cryptographic variables and subsystem management.  Uses the 3Com 3CR990 family of NIC cards.  Managed by a central, protected policy server.  Protects against IP Spoofing as the NIC is inaccessible.  Audit reports are sent to the audit manager in the policy server in the event of firewall policy violations. (Meredith, 2003)
  • 8. Drawbacks of NES, ADF & EFW  Large amount of Network traffic is generated due to heavy rate of audit messages.  Due to the limited processing power and memory on the NIC, its packet filtering capability is limited and the NIC can be overloaded by network traffic even when small firewall rulesets are used  High convergence time of the firewalls as every end-user host needs to be constantly updated. (Ramsurrun and Soyjaudah, 2009)
  • 9. Stateful Clustered Security Gateway Distributed Firewalls This architecture consists of multiple firewall nodes actively working in parallel to filter network traffic, both internal and external. (Ramsurrun and Soyjaudah, 2009)
  • 10. Components of the Stateful CSG  Policy Distributor- Receives and reads update files created by the admin and distributes to the specified IP address of the CSMs using TCP protocol.  CSM- Receives and reads updates files by the csm_updatehandler() function , reconstructs it to ensure that it is error free. Sends the firewalls update to each of the CSG firewall nodes using unicast TCP connection. During transmission of the update files, data as well as network security is achieved using a security protocol - IPsec. (Ramsurrun and Soyjaudah, 2009)
  • 11. IPsec  IPsec is an IP layered protocol that protects the sending and receiving of cryptographically–protected packets of any kind, without any modification (Alshamsi and Saito, 2005).  In distribution of firewall policies from the policy distributor to CSMs and for securing error reports and logs sent from the CSMs to the network admin in case of policy update file errors, IPsec is utilized to protect this data. (Ramsurrun and Soyjaudah, 2009)
  • 12. Benefits of Stateful CSG When CSG distributed firewall system is successfully implemented, the following attacks are addressed:  Insider attacks  IP & MAC address spoofing  Packet sniffing  Denial of Service In addition to the threat solved by Stateful CSG, some of the advantages of implementing Stateful CSG over other distributed firewall schemes are summarized in Table 1. (Ramsurrun and Soyjaudah, 2009)
  • 13. Characteristics EFW ADF NES Stateful CSG-base Fine-grained security × × × ✔ Firewall tamper resistance ✔ ✔ ✔ ✔ High scalability ✔ ✔ ✔ ✔ Anti-spoofing ✔ ✔ ✔ ✔ Anti-sniffing ✔ ✔ ✔ ✔ Low overall network load × × × ✔ Secure real-time ✔ ✔ ✔ ✔ Low convergence time × × × ✔ Low end-user host processing strain ✔ ✔ ✔ ✔ Context knowledge × × × × (Ramsurrun and Soyjaudah, 2009)Table 1
  • 14.  It is a capital intensive approach to implement, due to its hardware based architecture. Drawback of Stateful CSG
  • 15. Conclusion  In this presentation, different security issues in LANs were reviewed and how these threats are addressed by implementing a distributed firewall scheme.  Different distributed firewall schemes were analysed and compared and then, we highlighted a particular distributed firewall (Stateful CSG) and how it is being implemented in securing LANs and its benefits.  The implementation of a load balancing NIC to protect against load balancing rule tamper by malicious end-user hosts.
  • 16. References Alshamsi, A. and Saito,T., 2005, March. A technical comparison of IPSec and SSL. In null (pp. 395-398). IEEE. Davis, C. (1995). Firewall Consortium. Network Security, 1995(9), p.9. Kahate, A. (2003). Cryptography and network security. New Delhi:Tata McGraw-Hill Pub. Markham,T. and Payne, C., 2001, June. Security at the network edge: A distributed firewall architecture. In discex (p. 0279). IEEE. Meredith, L.M., 2003, April. A summary of the autonomic distributed firewalls (ADF) project. In DARPA Information Survivability Conference and Exposition, 2003. Proceedings (Vol. 2, pp. 260-265). IEEE. Payne, C. and Markham,T., 2001, December. Architecture and applications for a distributed embedded firewall. In Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual (pp. 329-336). IEEE. Ramsurrun,V. and Soyjaudah, K.M.S., 2009, January. A stateful CSG-based distributed firewall architecture for robust distributed security. In Communication Systems and Networks andWorkshops, 2009. COMSNETS 2009. First International (pp. 1-10). IEEE. Slideshare.net, (2016). Rationalization and Defense in Depth -Two Steps Closer to the Clouds. [online]Available at: http://www.slideshare.net/OTNArchbeat/rationalization-and-defense-in-depth-two-steps-closer-to-the-clouds [Accessed 13 Jan. 2016]. Stallings, W. and Stallings, W. (1999). Cryptography and network security. Upper Saddle River, N.J.: Prentice Hall.