Network intrusion detection : an analyst's handbook
著者
書誌事項
Network intrusion detection : an analyst's handbook
(New Riders professional library)
New Riders
大学図書館所蔵 全4件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
内容説明・目次
内容説明
Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains unparalleled, practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures. Ideal for the serious security analyst, Network Intrusion Detection: An Analyst's Handbook is the tool that puts you in full control of your network's security.
目次
1. Mitnick Attack.
Exploiting TCP. Detecting the Mitnick Attack. Preventing the Mitnick Attack. Summary.
2. Introduction to Filters and Signatures.
Filtering Policy. Signatures. Filter Examples. Policy Issues Related to Targeting Filters. Summary.
3. Architectural Issues.
Events of Interest. Limits to Observation. Low-Hanging Fruit Paradigm. Human Factors Limit Detects. Severity. Countermeasures. Sensor Placement. Outside Firewall. Push/Pull. Analyst Console. Host- or Network- Based Intrusion Detection. Summary.
4. Interoperability and Correlation.
Multiple Solutions Working Together. Commercial IDS Interoperability Solutions. Correlation. SQL Databases. Summary.
5. Network-Based Intrusion Detection Solutions.
Commercial Tools. MS Windows-Capable Systems. UNIX-Based Systems. GOTS. Evaluating Intrusion Detection Systems. Lincoln Labs Approach. Summary.
6. Detection of Exploits.
False Positives. IMAP Exploits. Exploit Ports with SYN/FIN Set. Scans to Apply Exploits. Single Exploit, portmap. Summary.
7. Denial of Service.
Commonly Detected Denial-of-Service Traces. Rarely Seen Well- Known Programs. Summary.
8. Intelligence Gathering Techniques.
Network and Host Mapping. NetBIOS Specific Traces. Stealth Attacks. Summary.
9. Introduction to Hacking.
Christmas Eve 1998. Where Attackers Shop. Communications Network. Anonymity. Summary.
10. Coordinated Attacks.
Coordinated Traceroutes. NetBIOS Deception. RESETs and More RESETs. SFRP Scans. Target-Based Analysis. Summary.
11. Additional Tools.
eNTrax. CMDS 4.0. tripwire. nmap. Summary.
12. Risk Management and Intrusion Detection.
Intrusion Detection in a Security Model. Defining Risk. Risk. Defining the Threat. Risk Management Is Dollar Driven. How Risky Is a Risk? Summary.
13. Automated and Manual Response.
Automated Response. Honeypot. Manual Response. Summary.
14. Business Case for Intrusion Detection.
Part One: Management Issues. Part Two: Threats and Vulnerabilities. Part Three: Tradeoffs and Recommended Solutions. Summary.
15. Future Directions.
Increasing Threat. Cyber Terrorism and Y2K. Trusted Insider. Improved Response. The Virus Industry Revisited. Hardware-Based ID. Defense in Depth. Program-Based ID. PDD63. Smart Auditors.
「Nielsen BookData」 より