Preparing your image...
Firewalls & Intrusion Detection Systems
Created By Eng. Eslam Osama
Before diving into firewalls and IDS, it's crucial to understand the fundamental goals of information security:
Protection of data from unauthorized disclosure.
Assurance that data received is as sent by an authorized entity.
Assures that systems work promptly and service is not denied to authorized users.
The property of being genuine/able to be verified/trusted/confidence in the validity of a transmission/message/message originator.
The security goal that generates the requirement for actions of an entity to be traced uniquely.
Information security means protecting data so that only the right people can access it (confidentiality), it stays accurate and unchanged (integrity), and it's available when needed (availability). It also includes user's identity can be identified (authenticity), actions can be tracked (accountability), no one can deny their actions (non-repudiation), and the system works reliably.
Network security focuses on protecting networks and their devices from unauthorized access, changes, or damage. It ensures that data can move safely through the network and that everything connected (like routers or servers) works correctly and securely without causing harm or being exposed to threats.
A firewall is like a security gate that controls what data can go in or out of your network. It helps protect your internal network from the dangers of the internet and is often the first layer of defense.
Firewalls control what data enters or leaves a network by checking each packet against a set of rules. They filter traffic based on details like:
This helps block unwanted or harmful traffic and only allows approved connections to pass through.
Firewalls help control who can access your network by using predefined rules, which are settings created by network administrators to decide what is allowed or blocked. These rules tell the firewall to either permit or deny network connections based on things like IP addresses, ports, or types of services.
NAT lets many devices (like phones, laptops, smart devices) inside your private network use one public IP address to connect to the internet.
Purpose:Firewalls provide protection against various network threats, such as malware, viruses, and intrusion attempts.
Firewalls often support VPNs (Virtual Private Networks), which allow users to safely connect to a private network from a remote location (like from home or while traveling). A VPN encrypts the connection, keeping data private and secure from hackers, especially on public Wi-Fi. Firewalls help control and protect these remote connections by only allowing trusted users to access the network.
Firewalls maintain logs of network traffic and security events. These logs can be used for monitoring and auditing purposes.
It is a security feature that monitors network traffic to detect and stop attacks or suspicious activity in real time and also Alert admins, so they know something suspicious is happening.
Means splitting a big network into smaller, separate zones or sections using a firewall. Each section is like a "mini-network" inside the main one.
A network security tool that checks each data packet and decides if it should be allowed or blocked, based on rules. It works on Network layer to handles IP addresses and Transport layer to handles port numbers and protocols.
Packet Filtering Firewall Diagram
A smart type of firewall that not only looks at each packet (similar to Packet Filtering Firewall) but also remembers previous packets and the state of the connection. It works on Network layer to handles IP addresses, Transport layer to handles port numbers and protocols, and state awareness to keeps track of connection status.
Stateful Inspection Diagram
A type of firewall that acts like a security middleman between users and web servers as it inspects and filters traffic at the Application Layer.
ALG Diagram
A type of firewall that works at the Transport Layer to control network connections. It doesn't inspect the content of traffic, just makes sure the connection (like a TCP handshake) is valid.
Circuit-Level Gateway Diagram
A DMZ (Demilitarized Zone) is a special zone in a network that sits between the internal network (LAN) and the external internet (WAN). It acts as a buffer zone for hosting public services (like websites) while protecting the internal network.
DMZ Network Diagram
Host company websites accessible to the public
Handle incoming and outgoing email communications
Resolve domain names for external users
Allow file transfers with external parties
It is a hardware or software solution that monitors, gathers, and analyzes information from a computer system or network to detect and alert about unauthorized or suspicious attempts to access, misuse, or compromise system resources.
Note: IDS is a passive system as it does not block attacks, only detects and alerts.
Any violation of security policies, whether by external attackers or internal authorized users, that threatens:
The process of monitoring and analyzing system or network activities to identify signs of intrusions or policy violations.
Monitors activities on individual devices like computers or servers as it keeps an eye on system files, logs, and applications to spot any unusual behavior or unauthorized changes.
Watches over the entire network's traffic to identify suspicious activities as it analyzes data packets moving across the network to detect patterns that match known threats or anomalies.
Responsible for collecting data from various sources in the system or network.
Receive input from sensors and are responsible for determining if an intrusion has occurred.
Enables a user to view output from the system or control its behavior.
Compares incoming data to a database of known attack patterns (signatures). If a match is found, an alert is triggered.
Like a security guard checking IDs against a list of known criminals.
Establishes a baseline of normal system behavior and flags deviations from this norm as potential threats.
Like a bank noticing unusual spending patterns on your credit card.
This is a critical concept for evaluating the effectiveness of any detection system, illustrated by the potential overlap in behaviors:
Intruder vs Authorized User Behavior Diagram
The IDS correctly identifies an actual intrusion. (Good!)
The IDS incorrectly flags legitimate activity as an intrusion. (Bad)
The IDS fails to detect an actual intrusion. (Very Bad - A real attack goes unnoticed)
The IDS correctly identifies legitimate activity as not an intrusion. (Good!)
Packet Filtering Firewall: Only examines individual packets based on basic criteria (IP addresses, ports, protocols) without considering the connection context.
Stateful Inspection Firewall: Not only examines individual packets but also remembers previous packets and tracks the state of connections, making decisions based on the entire connection context.
A type of firewall that acts as a security middleman between users and web servers, inspecting and filtering traffic at the Application Layer. It analyzes the actual content of communications based on application protocols like HTTP, rather than just examining packet headers.
A type of firewall that works at the Transport Layer to control network connections. It doesn't inspect the content of traffic, but ensures that connections (like TCP handshakes) are valid by creating separate connections between the user-gateway and gateway-external server.
DMZ (Demilitarized Zone): A special network zone that sits between the internal network and the external internet, acting as a buffer zone for hosting public services while protecting the internal network.
Typical systems in DMZ:
External Firewall: Sits between the external internet and the DMZ/internal network, protecting against outside threats and controlling what external traffic can enter the network.
Internal Firewall: Sits between the DMZ and the internal network, providing an additional layer of security to protect sensitive internal resources from both external threats and potentially compromised systems in the DMZ.
Host-Based IDS (HIDS): Monitors activities on individual devices (computers, servers) by examining system files, logs, and applications to detect unauthorized changes or suspicious behavior on that specific host.
Network-Based IDS (NIDS): Monitors the entire network's traffic by analyzing data packets moving across the network to detect suspicious activities, attack patterns, or anomalies in network communications.
This content is protected by copyright law. Unauthorized copying, distribution, or use of this material is strictly prohibited. The code, design, and content of this educational module are the exclusive property of the creator. Any reproduction or distribution without express written permission is a violation of copyright law.
This module is provided for educational purposes only. The creator makes no warranties about the completeness, reliability, or accuracy of this information.