Home > CS2610: Intro to Cyber Security and Network Communications > Network Security ToolsNetwork Security Tools
Hardware and/or software that controls network traffic based on source destination / protocol / context / content.
Human Firewall: Humans are the first line of defense.
- Hence, training is very important.
Types:
action | dir | source | dest | protocol | source | dest | flag |
---|---|---|---|---|---|---|---|
allow | out | 192.168.. | !(192.168..) | TCP | >1023 | 80 | any |
Modern OSes come with built-in host-based firewalls.
Detect and document malicious/anonymous activity.
Host-Based: File integrity, user behavior, process behavior, logs and audit.
Network: Deep packet inspection, network traffic/flow.
Host-based IDSes typically have more overhead.
Like IDS, except is also takes action to block activity.
False positives and negatives are hard to predict.
- Many businesses prefer IDSes manned by analysts over IPSes.
Remember: Rulesets need to be kept up-to-date, and tools aren’t foolproof.