data security in local networks using distributed firewalls anvesh bethu

18
Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Upload: stephany-phoebe-turner

Post on 22-Dec-2015

247 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Data Security in

Local Networks using

Distributed Firewalls

Anvesh Bethu

Page 2: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Firewall

• It controls the incoming and outgoing network traffic based

on applied rule set.

• It establishes a barrier between a trusted, secure

internal network and another network (e.g., the Internet)

that is assumed not to be secure and trusted.

Page 3: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Firewall Protects Against The Following Security Threats

Denial of Service (DOS)

IP Spoofing or IP Masquerading

Session Hijacking

Illegal Security Break-Ins

Physical Access to Servers in Data Centers

Page 4: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Corporate NetworkCorporateFirewall

Internet

InternalExternal

ExternalHost

InternalHost

1

InternalHost

2(untrusted)

Webserver

IntranetWebserver(companyprivate)

Architecture of standard firewall connection to the web server

Page 5: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Corporate NetworkCorporateFirewall

Internet

InternalExternal

ExternalHost

InternalHost

1

InternalHost

2(untrusted)

Webserver

IntranetWebserver(companyprivate)

blocked byfirewall connection

allowed,but should

not be

Architecture of standard firewall, connection to the Internet

Page 6: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

• Distributed firewall is a mechanism to enforce a network

domain security policy through the use of policy language.

• Security policy is defined centrally.

• This enables the identification of any member of the network

policy domain.

• Distributed Firewalls secure the network endpoints, exactly

where the hackers try to penetrate.

• It filters traffic from both the internal and internet network.

• They overcome the single point of failure concept.

Distributed firewalls

Page 7: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Architecture of Distributed Firewalls

Page 8: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Architecture of Distributed Firewalls

The management centre

Policy actuator

Remote endpoint connectors

Log server

Page 9: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu
Page 10: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Distributed firewall example to webserver

Corporate NetworkInternet

InternalExternal

ExternalHost

InternalHost

1

InternalHost

2(untrusted)

Webserver

IntranetWebserver(companyprivate)

InternalHost

(telecommuting)

Page 11: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Distributed Firewall example to Intranet

Corporate NetworkInternet

InternalExternal

ExternalHost

InternalHost

1

InternalHost

2(untrusted)

Webserver

IntranetWebserver(companyprivate)

InternalHost

(telecommuting)

Page 12: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Application Interaction with keynote

• Keynote provides a simple notation for specifying both local security policy and credentials that can be sent over an un-trusted network.

• Applications communicate with a “keynote evaluator”.

• monotonicity, means that gives a set of credentials associated with request, if there is any subset that would cause the request to be approved then the complete set will also cause the request to be approved.

• This simplifies both request resolution and credential management.

Page 13: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Application Interaction with Keynote

Verifier

Keynote

RequesterRequest, key, sign

Gather information local policy(Remote Credentials)

Pass information

GiveResponse

Evaluate

Page 14: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Components of Distributed firewalls

Central Management system Policy distribution Host-End Implementation

Page 15: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Central Management System

It addresses the need to maximize network security resources by enabling policies to be centrally configured, deployed, monitored, and updated.

From a single workstation, distributed firewalls can be scanned to understand the current operating policy and to determine if updating is required.

Page 16: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Policy Distribution

• The policy distribution scheme should guarantee the integrity of

the policy during transfer.

Host-End Implementation

• It provide any administrative control for the network administrator

to control the implementation of policies.

• The host allows traffic based on the security rules it has

implemented.

Page 17: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Reference

Firewalls 24 Seven, Strebehttp://ids.nic.in/http://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Distributed_firewallhttp://ijcsi.org/

Page 18: Data Security in Local Networks using Distributed Firewalls Anvesh Bethu

Questions??