Вы находитесь на странице: 1из 13

Network Security in Enterprise

Term Project Report for Advanced Network Security, EL


6393
Prashant Mehta (0428749)
Polytechnic Institute of NYU

Abstract Network security is an evolutionary process.


The goal of the Enterprise Security is to True network security comes from the
ensure the confidentiality, integrity and combination of products and services. With
availability of its valuable assets. In these free flow of information and the high
paper key aspects of network security in availability of many resources, the network
enterprise has been presented. To gain security administrator has to understand all
the in-depth of the topic a survey of the possible threat that can attack their
enterprise security equipment is networks.
presented with merits and demerits of the
equipment. For securing the enterprise assets a series of
network security technologies and products
Introduction- are strategically deployed throughout the
The Internet is changing our life in different network. Network Security services are
ways. Internet plays an important role in the implemented to guarantee the confidentiality
way we work, live, play, and learns. But of sensitive data, and to ensure the
with the Internet’s enormous growth comes availability and integrity of systems and
unprecedented exposure of personal data, data.
critical enterprise resources, government
secrets, and so forth. Every day hackers pose Common threats to enterprise environments
an increasing threat to these entities with include:
several different types of attacks.
There are two primary reasons for this Unauthorized Access
threat. First is the worldwide presence of the Unauthorized access is when an
Internet. With millions of devices currently unauthorized individual gains access to
connected to the Internet, and millions more valuable asset and has the possibility to
on the way, a hacker’s access to vulnerable tamper with that asset. Access to
devices will continue to increase. Shared information is generally gained while
knowledge on the global scale has allowed intercepting some information in transit over
the hackers to gain access to enterprise’s an insecure channel. The other way to access
data. Second is the wide presence of easy- to information is to exploit an inherent
to-use graphical user interface. This easy to weakness in a technology. Shared media
use interface could easily be distributed networks are particularly susceptible to
widely. Even a click of a mouse button eavesdropping because this type of network
could execute the attack with just the IP transmits packets everywhere.
address of the victim. Table 1 illustrates the common method
applied in gaining unauthorized access.
Need of Network Security in Enterprise-

1
Ways of obtaining Ways to use
unauthorized Unauthorized
access Access
Establishing false Sending email that
identity with false authorizes money
credentials transfers
Physical access to Modification to
network devices establish a better
credit rating
Eavesdropping on Retrieving
shard media confidential records,
networks such as salary for all
employees or
medical histories

Figure-1[1]
Table 1

Data loss Function of Network Security in


Data loss could be the result of theft or Enterprise
leakage of private and confidential data from The security design for the enterprise
servers, endpoints, while in transit, or as a network focuses on the following key areas:
result of spyware, malware, key-loggers, Network Foundation Protection (NFP)
viruses, etc. • Ensuring the availability and
integrity of the network
Impersonation infrastructure, protecting the control
Impersonation is the ability to present and management planes.
credentials as if you are representing some Internet Perimeter Protection
legitimate person. This includes theft of • Ensuring safe Internet connectivity
personnel identity or fraud on servers and and protecting internal resources and
end users through phishing and E-mail users from malware, viruses, and
spam. Another kind of spoofing attack is other malicious software.
replay attack. In this kind of attack the • Protecting personnel from harmful
message is recorded and replayed later to and inappropriate content.
gain access to the system.
• Enforcing E-mail and Web browsing
Many vendors have software available
policies.
that can capture the packets and then later
Server Farm Protection
replay the packets to gain access.
• Ensuring the availability and
Architecture of Network Security integrity of centralized applications
Figure-1 represents the architecture of and systems.
CISCO SAFE which provides security for • Protecting the confidentiality and
internal and external user. Security privacy of sensitive data.
architecture ensures the confidentiality, • Securing the access edges and
integrity and identity of valuable assets. enforcing authentication and role-

2
based access for users residing at the with adequate mechanism of identifying
main site and remote offices. authorized users, ensuring data integrity, and
• Ensuring systems are up-to-date and confidentiality.
in compliance with the enterprise The following elements of network security
network security policies. must be considered for designing the
network security of an enterprise.
Secure Mobility • Identity
• Providing secure, persistent • Integrity
connectivity to all mobile employees • Confidentiality
Enforcing encryption, authentication, • Availability
and role-based access to all mobile • Audit
users.
• Delivering consistent protection to Identity
all mobile employees from viruses, Identity is an important element of security
malware, botnets, and other in enterprise and incorporates both
malicious software. authentication and authorization.
• Ensuring a persistent enforcement of Authorization specifies the location and the
enterprise network security policies identity of a user and also the amount of
to all users and ensuring systems data user can access. Corporate must
comply with corporate policies and implement enough security parameters so
have up-to-date security. that intruders are not allowed to have to
• Small enterprise networks are built access of the valuable assets of the
with routers, switches, and other corporate.
network devices that keep the
applications and services running. Integrity
Therefore, properly securing these Integrity secures the physical and logical
network devices is critical for security of the network devices like routers,
continued operation. switches and firewalls. Any user who has
physical access to the router or switches has
Requirement of Network Security full control of that device and could lead to
compromise of the network security.
Security policies of an enterprise depend Enterprise physical security in the form of
upon the corporate needs and the assets they security guard, closed circuit television
are protecting. Generally the following key camera should be incorporated.
elements are considered before designing Logical security is implemented by
the security policies. providing identity mechanism that must
Today’s open networking technologies always be satisfied before user is allowed
provide a tremendous opportunity for access to the valuable assets of the
corporations to remain competitive. enterprise. Perimeter Security functions
Corporations have little control over the similarly like the firewall restricting the
information accessed by the user and the malicious traffic.
path though which this information is
accessed. Confidentiality
When designing the security policies for the Confidentiality refers to the privacy of data
network a balance should be reached flowing from the sender to the receiver. For
between ease of accessibility of information providing privacy between sender and

3
receiver, data is normally encrypted and Operational Simple and efficient
then send through the link. In the enterprise, Efficiency configuration,
sensitive information should always be deployment and
encrypted. management of the
infrastructure.
Availability Confidentiality, Security control to
Availability refers to the process of ensuring Integrity, and provide acceptable levels
that all critical resources are available when Availability of confidentiality,
requested. Generally, the enterprise system integrity and availability
should be prone to catastrophic error caused of data.
due to software bugs. Physical security Auditable and Security controls must be
ensures that no tampering has been done Measurable auditable and measurable
with the infrastructure. Logical security Controls to be effective
refers to the rerouting of the traffic and the System-wide Effective security
deterring of the software bugs. Collaboration requires sharing,
and correlation analysis, and correlation
Audit of information from all
Audit is necessary for verifying and system-wide sources.
monitoring of the corporate policy. Periodic Table 2
monitoring and verification can help detect
any unusual behavior and possible Challenges in Implementing Network
intrusions. Auditing should include methods Security
to discover malicious insider activity, Implementing Network Security at the
possible presence of DoS attacks, and service provider level is a difficult task and
overall compliance with the site security incorporates various challenges. Security
policy. policies vary from user to user. Due to this
While creating the data log files for audit variety in security policies there have been
following points should be consider numerous challenge faced by security
• Run the program which can filter the provider.
unusual activity form the audit data. The main goal of security vendor is to
• All the data should not be recorded ensure confidentiality, integrity, and
in the audit file. availability of the information that an
organization considers to be valuable.
Summary of Network Security Therefore the security should be provided
Requirement not just for managed endpoints but also for
unmanaged endpoints. Therefore the
Security Description network and information resources need to
Architecture be protected from endpoints that may be
Pronciple infected.
Defense in Deploy multiple layers of Diverse nature of traffic passes through the
Depth controls to prevent, service provider’s network. Due to this
identify and delay attacks diverse nature of traffic it is challenging to
in order to contain and implement policies to look for certain kind
minimize damage. of traffic or to block certain kind of traffic.
The traffic that might be good for one user
of the service provider might be a network

4
attack for another set of users. Therefore the
traffic classification as malicious is Complete Control
completely based on policies of a corporate. Harden, Strengthen Resiliency, limit Access, and
Another challenging situation faced in isolate devices, users, Traffic, applications and
protocols.
implementing security policies at the
enterprise level is the performance Harden Isolate Enforce
consideration. One of the primary goals of 1.Harden
1 . Isolate 1 . Enforce
an enterprise is to pass its traffic as fast and Devices, Subscribers, Security
accurate as possible. Security Transport,
Systems and Policies
implementation at the router can adversely services and Services
applications. 2 . Migrate
affect the performance of the routers. There
2 . Contain security
is always a tradeoff in implementing 2. Strengthen and protect events
security policies and performance of the Infrastructure
Resiliency,
system. redundancy
3.
Dynamically
In the emerging networking environment, a and fault Respond to
new threat attacks the network every day. tolerance Anomalous
Therefore the biggest challenge for security Event.
provider is to detecting the new threat.

Securing the Enterprise Infrastructure


In the above section we studied different Figure-3[3] Algorithm for Prevention
types of threat encountered in a network
security implementation and also the Figure 2 and figure 3 depict the algorithm
important we learned the functions of followed by the Cisco SAFE Security
network security. In this section we will go algorithm for securing the enterprise.
through the technology used by the security Various key elements of a Framework
provider in protecting from the threats. model are discussed below.
Total Visibility
Security Control Framework Model
Figure-2[2] Algorithm for Detection Total visibility consists of the following
elements: identity, trust, compliance, event
Total Visibility monitoring, and performance monitoring.
Identify, Monitor, collect, detect and Key considerations for total visibility
include the following:
classify users, traffic, applications and
protocols.
• Identifying and classifying users,
Identify Monitor Correlate
traffic, applications, protocols, and
Identify 1 .Monitor, 1 .Collect, usage behavior.
classify performance Correlate • Monitoring and recording activity
and analyze
and assign , behaviors
system-wide
and patterns.
trust levels and • Collecting and correlating data from
events
to compliance
multiple sources to identify trends,
subscriber, with policies 2 .identify,
service and Notify and
and system-wide events.
traffic. 2 .Identify report on • Detecting and identifying anomalous
Anomalous significant traffic and threats.
Traffic. related
events.

5
Complete Control
Complete control consists of hardening Authentication, Authorization and
individual devices, increasing the resiliency Accounting
of the network, isolating users, systems and Authentication refers to the process when an
services, security policy enforcement, and entity is authenticated by providing evidence
event mitigation. Key considerations for that it holds a specific digital identity such
complete control include the following: as identifier and the corresponding
credentials. Examples of such type of digital
• Hardening IT infrastructure, identity are passwords, one-time tokens,
including individual devices and digital certificates.
increasing network resiliency
• Limiting access and usage per user, Authorization function determines whether a
protocol, service, and application particular entity is authorized to perform a
• Isolating users, services, and given activity. Authorization is the next step
applications after the Authentication. Authorization for a
• Protecting against known threats and service or application is limited by a range
exploits of restrictions, for example time-of-day
• Dynamically reacting in response to restrictions, or physical location restrictions,
anomalous events or restrictions against multiple accesses by
the same entity or user. Examples of basic
Technology Used in Implementing types of service included are IP address
Network Security Policy filtering, address assignment, route
assignment, Quality of Service/differential
Total Visibility services, bandwidth control/traffic
Identify management, compulsory tunneling to a
specific endpoint, and encryption.
• Identity-based network solutions
• Authentication, Authorization and Accounting refers to the collection of
Accounting events, such as authentications and
• Biometric recognition authorization failures, or the consumption of
• Routing authentication (MD5) network resources through DoS attack by
• Secure messaging users. Typical information that is gathered in
• VPN authentication accounting is the identity of the user or other
o Digital certificates entity, the nature of the service delivered,
o Pre-shared keys when the service began, and when it ended,
o User authentication and if there is a status to report.

Identity Based network Solutions Biometric Recognition


In many older systems, user authentication It is a technique to identify the person
is done from a database. In these systems, through its fingerprint or eye iris recognition
the user normally provides their id and system. Another technique used now days is
password which is then checked against the skin texture analysis that turns the unique
database. If it matches, then oftentimes, an lines, patterns and spots apparent in a
"access control list" or ACL is checked. person’s skin into mathematical space.
The access control list determines the Biometric authentications are the process of
authorization privileges for the user. taking a "piece of you", digitizing it and

6
then using this to authenticate against an authenticate and verify an identity in single
identity directory or database. Typical types sign on systems, document management
of biometric authentications include finger systems and in web services.
scans, digital finger prints, hand scans,
retina scans, digital signature scans and Pre Shared Keys.
others. The use of DNA biometrics is In this type the user who is to be
increasingly used in identity verification. authenticated and the end host who is going
to authenticate the user share a common
Routing Authentication secret. The process of pre shared secret is
MD5 is used for routing authentication in shown in the figure-5
enterprise networks. It is a widely used
cryptography hash function with a 128-bit
hash value. It is used for integrity protection.
MD5 used a buffer that is made of four
words that are each 32 bits long. These four
words are then mixed with the words of the
input as is shown in figure-3.

Figure-5 Shared Key Authentication

MONITOR
Anomaly Detection System
An anomaly based System establishes a
performance baseline based on normal
network traffic evaluations. It will then
sample current network traffic activity to
this baseline in order to detect whether or
Figure-4[4] MD5 Process not it is within baseline parameters. If the
sampled traffic is outside baseline
VPN AUTHENTICATION parameters, an alarm will be triggered.
Digital Certificates
Another identity authentication method is IDS and IPS
public key infrastructure. An identity is Intrusion detection systems are devices or
given a digital certificate by a Certificate application that monitors network and
Authority (CA). This certificate is then system activities for malicious activities.
presented during the authentication process There are various types of Intrusion
to verify an identity. The level of detection systems.
authentication trust varies for digital Network Intrusion Detection System
certificates depending on the level of It identifies intrusion by analyzing the
identity verification done during the identity network traffic. SNORT is an example of
registration process as well as the digital NIDS and has the ability to perform real-
certificate revocation process. Digital time traffic analysis and packet logging.
certificates are becoming more important to Snort performs protocol analysis, content

7
searching and content matching. It has three including routing information in CDP
modes sniffer, packet logger, and network announcements.
intrusion detection. In sniffer mode, the
program will read network packets and NTP Synchronization
display them on the console. In packet OpenNTPD is used for synchronization of
logger mode, the program will log packets to the local clock of a computer with remote
the disk. NTP servers. This synchronization leads to
security, ease of use, and performance.
Host Based Intrusion Detection System
HIDS identifies intrusion by analyzing Isolate
system calls, application logs and other Controlling Network Devices Access
activities and state. OSSEC is used for An intruder who has access to networking
HIDS. It performs functions like log device can easily reconfigure the device.
analysis, integrity check, time based alerting Generally networks are accessed through
and active response. console ports, virtual terminal ports, and
auxiliary ports. Therefore minimum user
IPS should be authenticated before they can get
IPS is an extension of IDS whose function access through these ports.
include detection of intrusion by monitoring Password based Authentication:
the traffic and system activities. IPS can take A secret is used by the user to authenticate
actions as sending an alarm, dropping the itself to the network. But this is also immune
malicious packets, resetting the connection to password guessing attacks, eavesdropping
or blocking the offending IP address. and cloning.
Cisco use one time password schemes and
Syslog RADIUS and/or TACACS+ protocol to
Syslog is a standard for logging protocol authenticate the user before gaining them
messages. It separates the function of the access to network devices. In RADIUS and
software that generates messages from the TACACS+ protocol the change in password
system that stores them and the software that result in change of only one database.
reports and analyzes them. It also provides a
means for devices to notify administrators of Cisco Zone Based Policy Firewall
problems or performance. A zone is a group of interfaces that have
Syslog can be used for computer system similar functions or features. Security Zone
management and security auditing as well as is a group of interfaces to which a policy can
generalized informational, analysis, and be applied. The basic rules to be considered
debugging messages. Unique property of when setting up your zone are as follows:
this system allows the syslog to be used to • Traffic from a zone interface to a
integrate log data from many different types non zone interface or from a non
of systems into a central repository. zone interface to a zone interface is
always dropped.
Cisco Discovery Protocol • Traffic between two zone interfaces
This protocol is implemented in most of the is inspected if there is a zone
networking equipment. It is used to share relationship for each zone and if
information about other directly connected there is a configured policy for that
Cisco equipment. It can also be used for On- zone pair.
demand routing which is a method of

8
• By default, traffic between two various features in system management like
interfaces is always allowed. monitoring and managing servers and other
• A zone pair can be configured with a network equipment by remote control
zone as both the source and regardless of whether the machine is
destination zones. An inspect policy powered on.
can be configured on this zone pair On the other hand, in-band management is
to inspect or drop the traffic between the use of regular data channels to manage
two interfaces in the same zone. devices. To manage network servers and
routers remotely, security administrators
The following figure demonstrates the need network access when problems occur.
concept of zone firewall in Cisco.
VPN Encryption
Enterprise Encryption Gateway is an
encryption device that allows for strong
authentication and encryption for data across
a wireless medium. Using these devices
includes offloading duties from the access
points.

Figure-6[5] VPN
VPN use cryptographic tunneling protocols
The following situations can be interpreted to provide confidentiality by blocking
form the figure-1. intercepts and packet sniffing, allowing
• As the zone pair and policy are sender authentication to block identity
configured in the same zone. Traffic spoofing and provide message integrity.
flows freely between interfaces E0
and E1 because they are members of SSH
the same security zone (Z1). It is a network protocol that allows data to
• If no policies are configured, traffic be exchanged using a secure channel
will not flow between any other between two networked devices. SSH uses
interfaces. For example, E0 and E2, public key cryptography to authenticate the
E1 and E2, E3 and E1, and E3 and remote computer. SSH protocol is used to
E2. implement VPN. Its uses include:
• Traffic can flow between E0 or E1 • Secure file transfer
and E2 only when an explicit policy • For using encrypted VPN
permitting traffic is configured • For automated remote monitoring
between zone Z1 and zone Z2. and management of servers.
• Traffic can never flow between E3 • For forwarding or tunneling a port
and E0/E1/E2 unless default zones
are enabled. Access Control
In the enterprise network security a Access
Control List refers to rules that are applied
Out of Band Management to port numbers or network available, each
In enterprise out-of-band management with a list of hosts and/or networks
involves the use of a dedicated management permitted to use the service. Both individual
channel for device maintenance. It adds servers as well as routers can maintain and

9
implement network ACLs. Access control • Market leader with strong enterprise
lists can generally be configured to control presence
both inbound and outbound traffic. They • SSL VPN integrated into the ASA
work in a similar fashion as firewall works. • Complex licensing fees

Unicast RPF JUNIPER NETWORK SSG Family


URPF is based on the concept that traffic • Lower cost with full functionality
from known invalid networks should not be • Complete set of unified threat
accepted on interfaces from which they management security features
should never have been originated. So in
• No VPN integration
the router packet are only forwarded if
• Packet is coming from a valid host, Table 3 shown in the next page compares
as indicated in the corresponding CISCO ASA 5500 family with JUNIPER
entry in the routing table. SSG family. In the table we see many
• Packet with source address that similarities between them, but at the same
could not be reached via the input time there are significant differences in
interface can be dropped without services provided and functionality.
disruption to normal use.
Strength and Weakness:
Protection form Distributed Denial of Juniper Network SSG Family
Service Attacks Strengths: Juniper provides the security in
Distributed Denial of service Attack uses the enterprise with lower expenditure and
different attack tools to attack the victim. It the flexibility to add new features when
generally uses the master slave model to required. Juniper provides better centralized
initiate the attack. management.
DDoS attacks take different form like: Weakness: It lacks the SSL/VPN features.
• UDP Flood
• ICMP echo request flood CISCO ASA Family
• SYN flood Strengths: It provides a integrated
• Smurf Attack VPN/Firewall Services. This integrated
Various solutions have been suggested for service provide additional feature in the
protection against DDoS attacks. The segment.
solution is implemented in host level and Weakness: CISCO ASA 5500 family lacks
network level. the feature to provide necessary security in
enterprise. It generally requires additional
Network Security Equipment security module for IPS.
To gain the in-depth knowledge of the
network security equipment, different data
are collected from vendors like CISCO and
JUNIPER.
The intrusion prevention system studied for
this paper is CISCO ASA 5500[6] series
family and JUNIPER NETWORK[7] SSG
Family.

CISCO ASA 5500

10
Table 3[8] comparison between CISCO
ASA Family and JUNIPER SSG Family

11
Equipment Juniper Networks SSG Family Cisco ASA 5500
Detection It uses the following technology It uses the following technology
Technology • Stateful Signature • Protocol anomaly detection
Detection • Statistical anomaly detection
• Protocol Anomaly • Application anomaly detection
Detection • Statistical analysis
• Backdoor Detection • Evasion protection
• Traffic Anomaly Detection • Vulnerability-based signature
• IP Spoofing Detection detection
• DoS Detection • Exploit-based signature
• Layer 2 Detection detection
• Network Honeypot • Session normalization and
evasion detection
• On-box event correlation

Zero day Protocol anomaly detection and • Unknown exploit protection


protection same-day coverage for newly • Unknown vulnerability
found vulnerabilities. protection
• Day zero worm protection.
Protocol More than 60 protocol supported Network protocols supported include
supported IP, TCP, UDP, ICMP, NetBIOS/SMB,
MPLS, ARP, IPv6 encapsulated IPv4,
IGMP, IP-in-IP, and GRE.
Security Manage all functionality Firewall, Management of IPS and Firewall uses
Policies and VPN, IPS, routing. different CLI interfaces. Centralized
Management management is a relatively complex
mix of hard to use utilities
Custom Support custom signature Supports custom signature generation
Signature generation
Generation
Web Best-in-class offerings including Extra cost for the function and with
filtering integrated Web Filtering. license fee.
Integrated Not supported Supported with limited functionality
SSL VPN

LAN and LAN and WAN I/O ports Provides limited LAN Hardware
WAN provided support and no WAN support
Connectivity included.

References [5] Cisco IOS and NX-OS Software, Zone


[1] Design Zone for Security, Cisco SAFE, based policy firewall.
www.cisco.com [6] CISCO ASA 5500 Series Adaptive
[2] Cisco SAFE: A Design Blueprint for Security Appliances, www.cico.com
Enterprise Network. [7]SSG Series, www.juniper.net
[3] Cisco SAFE: A Design Blueprint for [8] Competitive HotSheet
Enterprise Network. www.cisco.com Juniper Networks SSGs vs Cisco ASA,
[4] Wikipedia, www.wikiedia.org juniper Networks.

12
13

Вам также может понравиться