Network Security Tools

Firewalls

1. Network-Based

Hardware and/or software that controls network traffic based on source destination / protocol / context / content.

Human Firewall: Humans are the first line of defense.

Types:

  1. Packet Filter: Static rules that uses header data.
  2. Stateful Packet Filer: Uses state (outgoing / incoming), header data, and state.
  3. Application Layer Gateway / Proxy: Deep packet inspection. Looks are head, payload, and context. More dynamic.
Example: Firewall rules
  1. Cisco Access Control Lists
  2. iptables
actiondirsourcedestprotocolsourcedestflag
allowout192.168..!(192.168..)TCP>102380any

2. Host-Based

Modern OSes come with built-in host-based firewalls.

Intrusion Detection (IDS)

Detect and document malicious/anonymous activity.

Host-Based: File integrity, user behavior, process behavior, logs and audit.

Network: Deep packet inspection, network traffic/flow.

Host-based IDSes typically have more overhead.

IDS Approaches

  1. Signature-based: Static rules
  2. Anomaly Detection: Dynamic statistical rules.

Intrusion Prevention (IPS)

Like IDS, except is also takes action to block activity.

False positives and negatives are hard to predict.

Remember: Rulesets need to be kept up-to-date, and tools aren’t foolproof.