当前位置:网站首页>Chapter 8 - firewall, Chapter 9 - Intrusion Detection
Chapter 8 - firewall, Chapter 9 - Intrusion Detection
2022-06-12 07:34:00 【bugmaker.】
Chapter viii. A firewall
- Firewall concept
(1) Advanced network access control device
(2) Location : Between different network security domains
(3) function : The only way , Enforce access control policies
(4) Purpose : Prevent external network users from entering the internal network to access internal network resources by illegal means , Protect the internal network operating environment - Firewall function : Firewall can not be used as everything for network protection , Nor should it be regarded as a final solution to all security problems .
(1) Create a blocking point
(2) Implement security policies
(3) Record network activity
(4) Limit network exposure
(5) Security function implementation platform - Firewall limitations
(1) May be bypassed , for example , Dial out inside the firewall
(2) Can't guard against internal attacks
(3) Internal personnel cannot be prohibited from copying sensitive data to U On the disk .
(4) Can not prevent the administrator without security awareness from granting temporary network access rights to intruders
(5) Can not prevent the transmission of virus infected programs or files 、 Mail, etc.
(6) Do not scan files
(7) Performance bottleneck 、 Single point failure
(8) Can't guard against new network security problems . - Firewall technology
(1) Packet filtering ( The network layer ): Check the header information of each package , Decide to discard or release the packet according to a set of rules . Filter according to the access control list
(2) Circuit level gateway
(3) Application proxy firewall : Completely block network traffic , receive 、 Analyze service requests , If it is allowed, the proxy user can obtain network information , There is no direct communication between internal and external networks ; Develop special agents for each application service . The main function : Acting as a firewall ; save IP expenses ; Improve access speed .
(4) State monitoring packet filtering firewall : Adopt connection based condition monitoring mechanism ( While packet filtering , Check the correlation between packets , Treat all packets belonging to the same connection as a whole data flow , See the whole process from the initiation to the end of each connection , Form the connection status table . The check includes the link layer 、 The network layer 、 Transport layer 、 Various information of the application layer , Combine the rule table and the status table to decide whether to allow the package to pass .); Dynamic connection status table ; Support multiple protocols and applications , It can easily realize application and service expansion .
The main functions of proxy server :
(1) Acting as a firewall
(2) save IP expenses
(3) Improve access speed - Firewall architecture
(1) Shielding router structure 、
(2) Dual host Architecture
(3) Shield host Architecture
(4) Shield subnet Architecture - limitations :
(1) May be bypassed
(2) Can't guard against internal attacks
(3) It can't prevent the security conscious administrator from granting temporary network access to some intruders
(4) Can not prevent the transmission of virus infected programs or files 、 Mail, etc.
(5) Performance bottleneck 、 Single point failure
(6) Can't guard against new network security problems .
Chapter nine Intrusion detection
- IDS Reason for introduction of
(1)IDS It is the second line of defense behind the firewall ;
(2) Firewall has many shortcomings , If it can be broken , Weak protection against certain attacks , Only illegal connection requests can be rejected , But the invaders' attacks are still unknown ;
(3) Invasion is easy
(4) Prevention is ideal , But testing is necessary . - Intrusion detection : Collect and analyze information from network or system key points , Find out whether there is any behavior violating the security policy and any sign of being attacked ; Monitor the operation status of the system , Various attack attempts have been detected 、 The act or result of an attack , To ensure the confidentiality of system resources 、 Integrity and availability .
- IDS The basic structure
Three functional units :
(1) information gathering : The source is the log file of the system or network 、 The network traffic 、 Abnormal changes in system directories and files 、 Abnormal behavior in program execution
(2) Information analysis : Including pattern matching 、 Statistical analysis and integrity analysis ( For post analysis ). Pattern matching refers to comparing the collected information with the known database of network intrusion and system misuse patterns , So as to find the behavior that violates the security policy ; Statistical analysis refers to the statistics of some measurement attributes of system objects in normal use , Then it is used to communicate with the network 、 Compare system behavior , When any observed value is outside the normal range , It is thought that an invasion has occurred . Integrity analysis focuses on whether a file or object has been changed , After discovering the changed 、 This is especially useful for applications where Trojans are installed
(3) The result processing - Classification of intrusion detection : According to the analysis method, it is divided into anomaly detection model and misuse detection model ; According to the data source, it is divided into host based 、 Network based and hybrid
- Response strategy : Pop up window alarm 、E-mail notice 、 Cut off the TCP Connect 、 Execute custom program 、 Interact with other security products
- How to respond : Passive response 、 Mild active response 、 Strict and proactive response
- The development direction of intrusion detection :
(1) More effectively integrate various intrusion detection data sources , Including data collected from different systems and different sensors , Improve alarm accuracy ;
(2) Combined with manual analysis in event diagnosis , Improve judgment accuracy ;
(3) Improve the ability to detect malicious code , Include email attack ,Java,ActiveX etc. ;
(4) Adopt certain methods and strategies to enhance the interoperability and data consistency of heterogeneous systems ;
(5) Develop reliable test and evaluation standards ;
(6) Provide scientific vulnerability classification methods , Especially from the point of view of attacking object rather than attacking subject ;
(7) Provide for more advanced attacks, such as distributed attacks 、 Detection methods for denial of service attacks ;
边栏推荐
- Understanding management - four dimensions of executive power
- Day 4 of pyhon
- Federated reconnaissance: efficient, distributed, class incremental learning paper reading + code analysis
- R语言e1071包的naiveBayes函数构建朴素贝叶斯模型、predict函数使用朴素贝叶斯模型对测试数据进行预测推理、table函数构建混淆矩阵
- Use of gt911 capacitive touch screen
- Pyhon的第五天
- In depth learning - overview of image classification related models
- 5 lines of code identify various verification codes
- Summary of machine learning + pattern recognition learning (VI) -- feature selection and feature extraction
- Voice assistant - overall architecture and design
猜你喜欢

Learning to continuously learn paper notes + code interpretation

Personalized federated learning using hypernetworks paper reading notes + code interpretation

Personalized federated learning with Moreau envelopes

Pyhon的第五天

Unity uses shaders to highlight the edges of ugu I pictures

FCPX插件:简约线条呼出文字标题介绍动画Call Outs With Photo Placeholders for FCPX

2022R2移动式压力容器充装试题模拟考试平台操作

Complete set of typescript Basics

Machine learning from entry to re entry: re understanding of SVM

Pyhon的第四天
随机推荐
‘CMRESHandler‘ object has no attribute ‘_ timer‘,socket. gaierror: [Errno 8] nodename nor servname pro
Model deployment learning notes (I)
RT thread studio learning (VIII) connecting Alibaba cloud IOT with esp8266
Set up a remote Jupiter notebook
Summary of semantic segmentation learning (II) -- UNET network
Formatting the generalization forgetting trade off in continuous learning
Acwing - 4269 school anniversary
[wax chain tour] release a free and open source alien worlds script TLM
2022年G3锅炉水处理复训题库及答案
Golang quickly generates model and queryset of database tables
There is no solid line connection between many devices in Proteus circuit simulation design diagram. How are they realized?
Arrangement of statistical learning knowledge points gradient descent, least square method, Newton method
Use of gt911 capacitive touch screen
Unity uses shaders to highlight the edges of ugu I pictures
Pyhon的第六天
Federated reconnaissance: efficient, distributed, class incremental learning paper reading + code analysis
MySQL索引(一篇文章轻松搞定)
2022 simulated test platform operation of hoisting machinery command test questions
Imx6q PWM drive
Stm32cubemx learning (I) USB HID bidirectional communication