Firewall
A firewall can be both software and hardware. The firewall analyses the incoming and outgoing network traffic determining whether or not to allow the data packets through the firewall. Rules can be added and taken away from the firewall settings depending on what the user wants to block and allow through. Most operating systems come pre-loaded with their own firewall as will most routers.There are different types of firewall. These are packet-filtering firewalls, stateful firewalls and a proxy firewall.
Packet-filtering firewalls, as the name suggests analyses the packets that are attempting to come through the firewall. The packet-filtering takes place by using ACLs. ACLs are essentially a set of rules the the packets must be abiding by to be allowed through the firewall. Providing the packets are deemed as safe using the ACLs, then they will pass through the firewall. Packet-filtering is the method used by first generation firewalls. It was the first type of firewall to be used and it was very effective but firewalls have evolved greatly from the first generation firewall. The advantages of a packet-filtering firewall are that they have high performance and they are scalable. Packet filtering has weaknesses such as, they do not protect against advanced user authentication systems, most packet-filtering system do not protects against spoofing and if configured improperly they can be broken very easily.
A stateful inspection packet filtering firewall keeps a track of all communications between devices. This is achieved by retaining packets until enough information is available to make a judgement about its state. This type of filtering can be effective as you can have more complicated rules, such as allowing access to an open port as long and it is in response to a request. The firewall maintains a table of all communication between devices which makes it very effective. Al though it uses more resources than packet-filtering firewalls it doesn't have as much as a performance hit as proxy firewalls. Stateful firewalls are considered as a third generation firewall.
A proxy firewall makes the connection between trusted and untrusted sources.The use of a proxy firewall is that the proxy firewall receives all data before its actual destination. This means when a request is received, the proxy firewall will analyse it before it sends it on to the destination host. The proxy firewall can analyse the packet all the way to the application layer which is more effective than other firewalls. It provides better protection than packet filtering and breaks the connection between trusted and untrusted systems. Proxy firewalls do come with complications. It can slow traffic performance, it only support limited applications and although it breaks the connection between trusted and untrusted applications which is good for security, it is bad for functionality.
Honeypot
A honeypot is s a trap set to detect, deflect, or, in some manner, counteract attempts at unauthorised use of information systems. Generally, a honeypot consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.I honeypot isn't only used to detect attacks, it can be used to get the attackers IP and then add this to the firewall of the actual server so that the hacker cant access it.Intrusion detection Systems (IDS)
An IDS can be either a device or software and it is used to monitor the network for malicious activities and policy violations. There are two ways that IDS work. These are; Host Intrusion detection systems (HIDS) or network detection system (NIDS). With NIDS, packets in the network will be analysed detecting malicious code that the firewall may have missed. HIDS will analyse the data on each individual computer (host). IDSs can be active or passive. Passive will mean that it will. notify the network administration if it notices suspicious activity. Active IDSs will detect, act on the problem and send a notification to the network manager. The two ways IDSs can detect malicious packets are with a knowledge based IDS ans a behaviour based IDS.Knowledge based intrusion detection systems are far more common, they work much like anti-virus software. They have different attack methods in their knowledge, if something in the network or on the host matches one of these, an alarm will be triggered. The biggest advantage of this is. that it has a very low false alarm rate. The disadvantages include that the attacks have to have happened to them to be known about, is it is a new attack the chance are it will be undetected.
Behaviour based intrusion detection systems base their alerts on the behaviour of users. If a user does something unexpected, the IDS will alert the system administrator. To determine what 'normal use' is, the IDS generates a model by various means which it will compare the users action to. It can be very effective as an attack will not have to be known about for it to be detected. It can also prevent users accessing things that they shouldn't, as well as playing a big part in the discovery of new exploits. The largest disadvantage of a behaviour based IDS is that the false alarm rate is extremely large. This is a huge drawback and a nuisance that many network administrators don't want. Also the behaviour model can change regularly, what is seen as perfectly safe one day could be seen as an exploit another day.
