240 likes | 250 Views
Topics. Network Security Major Problems Why Firewall? Problems with Firewalls What is an Intrusion Detector? Problems with Intrusion Detectors What is a Content Management Firewall? HACKTRAP Features Future Trends Demo. Network Security Major Problems.
E N D
Topics • Network Security Major Problems • Why Firewall? • Problems with Firewalls • What is an Intrusion Detector? • Problems with Intrusion Detectors • What is a Content Management Firewall? • HACKTRAP Features • Future Trends • Demo
Network Security Major Problems • Providing information confidentiality. • Providing data integrity. • Protecting network services availability.
Problems with Firewalls • Checks packet headers ONLY • Does NOT detect header intrusions
What is an Intrusion Detector? • A tool that detects intrusion attempts. • Alerts the network administrator with detected intrusions.
Problems with Intrusion Detectors • Does NOT take permanent actions • Does NOT block specific IPs and PORTs
What is a Content Management Firewall? • A new approach of firewalls. • Combines the features of BOTH Firewalls and Intrusion Detectors. • Checks NOT ONLY packet’s header but contents as well. • Blocks the source of the detected intrusions.
HACKTRAP A content management firewall IS OUR SOLUTION
HACKTRAP Features • Three Security Levels • FRA (Fast Response Action) Firewall Rules • IDS (Intrusion Detection system) Alerts • ISS (Integrated security system) feedback from IDS to FRA
HACKTRAP Model ISS Generate FRA FRA 2 IDS 3 1 Internal Network External Network 1 3
HACKTRAP Features • Dynamic Action Generation FWRule FW FRActions IDSPRule IDS ISS IDMPRule
HACKTRAP Features • Administrator point of view • Add and Remove types of attacks. • Different types of alerts : popup messages, Data base, XML format ,TCP dump format. • Restrict and unrestrict hosts accessing firewall . • Close and open different services (ports) for outside hosts. • Developer point of view • Intrusions can be easily implemented
Future Work • Enhance for better performance. • Using iptables with the ipchains. • Using ACID to make a good analysis on the intrusion detection output to the data base and display neat graphs representing it. • Adding another output modules such as email & SMS.
Unix Server LAN Internet Hacker Web Server
z y x V x x y y Packet forwarding And NAT (Masquerading) x y Internet Z V
rule2 rule2 rule2 rule3 rule3 rule3 rule4 rule4 rule4 Local process rule1 d Output chain router e ACCEPT ACCEPT m DENY ACCEPT a Input chain s q Forward chain log host
preprocessor Attacks rules Input chain Log file Forward chain Samba alert Alert file database Output chain +
Lunix LAN Internet HACKTRAP Hacker Windows