Introduction

Network Security involves protecting the underlying network infrastructure from unauthorized access, misuse, and attacks. Networks connect computers at distant locations, raising additional security challenges.

Key Challenge: Data in transmission must be protected, and network connectivity exposes each computer to more vulnerabilities than isolated systems.

Network Attacks

Types of Attacks

1. Interruption (Attack on Availability)

  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)
  • Destroying hardware
  • Disabling file systems

2. Interception (Attack on Confidentiality)

  • Wiretapping
  • Packet sniffing
  • Illicit copying

3. Modification (Attack on Integrity)

  • Altering messages
  • Changing data files
  • Man-in-the-Middle attacks

4. Fabrication (Attack on Authenticity)

  • Inserting spurious messages
  • Message replay
  • IP spoofing

Passive vs Active Attacks

  • Passive: Eavesdropping, difficult to detect
  • Active: Modification, easier to detect

Firewalls

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on security rules.

Types of Firewalls

Packet Filtering Firewall

  • Examines individual packets
  • Filters based on IP, port, protocol
  • Fast but limited

Stateful Inspection Firewall

  • Tracks connections
  • Remembers state of connections
  • More intelligent than packet filtering

Application Firewall (Proxy)

  • Operates at application layer
  • Understands specific protocols
  • Provides better inspection

Next-Generation Firewall (NGFW)

  • Combines traditional firewall with IDS/IPS
  • Application awareness
  • Threat intelligence integration

DMZ (Demilitarized Zone)

Isolated network segment for public-facing services:

Internet → Firewall → DMZ (Web Servers) → Internal Network

Intrusion Detection & Prevention

IDS (Intrusion Detection System)

  • Monitors network for suspicious activity
  • Alerts administrators
  • Does not take action

IPS (Intrusion Prevention System)

  • Monitors and prevents threats
  • Takes automatic action
  • Can block traffic

Detection Methods

Signature-Based Detection

  • Known attack patterns
  • Effective against known threats
  • Cannot detect new attacks

Anomaly-Based Detection

  • Detects deviations from normal
  • Can detect unknown attacks
  • May have false positives

Virtual Private Networks (VPN)

A VPN creates a secure, encrypted connection over a public network.

VPN Protocols

IPSec

  • Encrypts IP packets
  • Authentication header
  • Encapsulating Security Payload

SSL/TLS VPN

  • Uses SSL/TLS encryption
  • Browser-based access
  • More user-friendly

WireGuard

  • Modern, lightweight
  • Fast and secure
  • Simple codebase

VPN Types

  • Site-to-Site: Connects networks
  • Remote Access: Individual users