Page 226 - DCAP403_Operating System
P. 226

Unit 11: System Security





          Once again, the result is a self-inflicted Denial of Service condition, as the IPS device fi rst drops   Notes
          the “offending” packet, and then potentially blocks the entire data  flow from the suspected

          hacker.

          If the traffic that triggered the false positive alert was part of a customer order, you can bet that
          the customer will not wait around for long as his entire session is torn down and all subsequent
          attempts to reconnect to your e-commerce site (if he decides to bother retrying at all, that is) are
          blocked by the well-meaning IPS.
          Another potential problem with any Gigabit IPS/IDS product is, by its very nature and
          capabilities, the amount of alert data it is likely to generate. On such a busy network, how many
          alerts will be generated in one working day? Or even one hour? Even with relatively low alert
          rates of ten per second, you are talking about 36,000 alerts every hour. That is 864,000 alerts each
          and every day.
          The ability to tune the signature set accurately is essential in order to keep the number of alerts
          to an absolute minimum. Once the alerts have been raised, however, it then becomes essential to
          be able to process them effectively. Advanced alert handling and forensic analysis capabilities
          including detailed exploit information and the ability to examine packet contents and data
          streams  can make or break a Gigabit IDS/IPS product.
          Of course, one point in favour of IPS when compared with IDS is that because it is designed
          to prevent the attacks rather than just detect and log them, the burden of examining and
          investigating the alerts – and especially the problem of rectifying damage done by successful
          exploits – is reduced considerably.
          11.10 Firewall to Protect Systems and Networks


          A firewall is a dedicated appliance, or software running on another computer, which inspects

          network traffic passing through it, and denies or permits passage based on a set of rules.

          Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls
          are frequently used to prevent unauthorized Internet users from accessing private networks
          connected to the Internet, especially intranets. All messages entering or leaving the intranet

          pass through the firewall, which examines each message and blocks those that do not meet the

          specified security criteria.

          Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that’s

          why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading


          from one area to the next.
          A fi rewall is simply a program or hardware device that fi lters the information coming through
          the Internet connection into your private network or computer system. If an incoming packet


          of information is flagged by the filters, it is not allowed through. Let’s say that you work at a
          company with 500 employees. The company will therefore have hundreds of computers that all
          have network cards connecting them together.
          In addition, the company will have one or more connections to the Internet through something

          like T1 or T3 lines. Without a firewall in place, all of those hundreds of computers are directly
          accessible to anyone on the Internet. A person who knows what he or she is doing can probe
          those computers, try to make FTP connections to them, try to make telnet connections to them
          and so on. If one employee makes a mistake and leaves a security hole, hackers can get to the
          machine and exploit the hole.

          With a firewall in place, the landscape is much different. A company will place a firewall at every

          connection to the Internet (for example, at every T1 line coming into the company). The fi rewall





                                           LOVELY PROFESSIONAL UNIVERSITY                                   219
   221   222   223   224   225   226   227   228   229   230   231