Extrusion Detection: Security Monitoring for Internal Intrusions
暫譯: 擠出檢測:內部入侵的安全監控
Richard Bejtlich
- 出版商: Addison Wesley
- 出版日期: 2005-11-01
- 售價: $1,800
- 貴賓價: 9.5 折 $1,710
- 語言: 英文
- 頁數: 424
- 裝訂: Paperback
- ISBN: 0321349962
- ISBN-13: 9780321349965
-
相關分類:
資訊安全
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$690$587 -
$2,220$2,109 -
$1,190$1,131 -
$413Hibernate: A Developer's Notebook
-
$1,980The Tao Of Network Security Monitoring: Beyond Intrusion Detection
-
$2,550$2,423 -
$490$417 -
$1,240GNU/Linux Application Programming (Paperback)
-
$2,800$2,660 -
$480$408 -
$880$695 -
$560$442 -
$480$379 -
$390$308 -
$890$757 -
$260$205 -
$450$356 -
$780$663 -
$775Security Log Management: Identifying Patterns in the Chaos
-
$720$569 -
$580$458 -
$390$308 -
$650$507 -
$1,728Virtual Honeypots: From Botnet Tracking to Intrusion Detection
-
$2,050$1,948
商品描述
Table of Contents
Table of Contents |
Foreword. Preface. I. DETECTING AND CONTROLLING INTRUSIONS. 1. Network Security Monitoring Revisited. Why Extrusion Detection? Defining The Security Process Security Principles Network Security Monitoring Theory Network Security Monitoring Techniques Network Security Monitoring Tools Conclusion 2. Defensible Network Architecture. Monitoring the Defensible Network Controlling the Defensible Network Minimizing the Defensible Network Keeping the Defensible Network Current Conclusion 3. Extrusion Detection Illustrated. Intrusion Detection Defined Extrusion Detection Defined History of Extrusion Detection Extrusion Detection Through NSM Conclusion 4. Enterprise Network Instrumentation. Common Packet Capture Methods PCI Tap Dual Port Aggregator Tap 2X1 10/100 Regeneration Tap 2X1 10/100 SPAN Regeneration Tap Matrix Switch Link Aggregator Tap Distributed Traffic Collection with Pf Dup-To Squid SSL Termination Reverse Proxy Conclusion 5. Layer 3 Network Access Control. Internal Network Design Internet Service Provider Sink Holes Enterprise Sink Holes Using Sink Holes to Identify Internal Intrusions Internal Intrusion Containment Notes on Enterprise Sink Holes in the Field Conclusion II. NETWORK SECURITY OPERATIONS. 6. Traffic Threat Assessment. Why Traffic Threat Assessment? Assumptions First Cuts Looking for Odd Traffic Inspecting Individual Services: NTP Inspecting Individual Services: ISAKMP Inspecting Individual Services: ICMP Inspecting Individual Services: Secure Shell Inspecting Individual Services: Whois Inspecting Individual Services: LDAP Inspecting Individual Services: Ports 3003 to 9126 TCP Inspecting Individual Services: Ports 44444 and 49993 TCP Inspecting Individual Services: DNS Inspecting Individual Services: SMTP Inspecting Individual Services: Wrap-Up Conclusion 7. Network Incident Response. Preparation for Network Incident Response Secure CSIRT Communications Intruder Profiles Incident Detection Methods Network First Response Network-Centric General Response and Remediation Conclusion 8. Network Forensics. What Is Network Forensics? Collecting Network Traffic as Evidence Protecting and Preserving Network-Based Evidence Analyzing Network-Based Evidence Presenting and Defending Conclusions Conclusion III. INTERNAL INTRUSIONS. 9. Traffic Threat Assessment Case Study. Initial Discovery Making Sense of Argus Output Argus Meets Awk Examining Port 445 TCP Traffic Were the Targets Compromised? Tracking Down the Internal Victims Moving to Full Content Data Correlating Live Response Data with Network Evidence Conclusion 10. Malicious Bots. Introduction to IRC Bots Communication and Identification Server and Control Channels Exploitation and Propagation Final Thoughts on Bots Dialogue with a Bot Net Admin Conclusion Epilogue Appendix A: Collecting Session Data in an Emergency. Appendix B: Minimal Snort Installation Guide. Appendix C: Survey of Enumeraiton Methods. Appendix D: Open Source Host Enumeration. Index. |
商品描述(中文翻譯)
目錄
前言
序言
I. 偵測與控制入侵
1. 網路安全監控再探
- 為什麼要進行外洩偵測?
- 定義安全過程
- 安全原則
- 網路安全監控理論
- 網路安全監控技術
- 網路安全監控工具
- 結論
2. 可防禦的網路架構
- 監控可防禦的網路
- 控制可防禦的網路
- 最小化可防禦的網路
- 使可防禦的網路保持最新
- 結論
3. 外洩偵測示意
- 定義入侵偵測
- 定義外洩偵測
- 外洩偵測的歷史
- 透過網路安全監控進行外洩偵測
- 結論
4. 企業網路儀器化
- 常見的封包擷取方法
- PCI Tap
- 雙埠聚合器 Tap
- 2X1 10/100 再生 Tap
- 2X1 10/100 SPAN 再生 Tap
- 矩陣交換機
- 連結聚合器 Tap
- 使用 Pf Dup-To 進行分散式流量收集
- Squid SSL 終止反向代理
- 結論
5. 第三層網路存取控制
- 內部網路設計
- 網際網路服務提供者的沉沒孔
- 企業沉沒孔
- 使用沉沒孔識別內部入侵
- 內部入侵控制
- 企業沉沒孔的現場注意事項
- 結論
II. 網路安全操作
6. 流量威脅評估
- 為什麼要進行流量威脅評估?
- 假設
- 初步評估
- 尋找異常流量
- 檢查個別服務:NTP
- 檢查個別服務:ISAKMP
- 檢查個別服務:ICMP
- 檢查個別服務:安全外殼
- 檢查個別服務:Whois
- 檢查個別服務:LDAP
- 檢查個別服務:TCP 3003 到 9126 的埠
- 檢查個別服務:TCP 44444 和 49993 的埠
- 檢查個別服務:DNS
- 檢查個別服務:SMTP
- 檢查個別服務:總結
- 結論
7. 網路事件響應
- 網路事件響應的準備
- 安全的 CSIRT 通訊
- 入侵者檔案
- 事件偵測方法
- 網路初步響應
- 網路中心的通用響應與修復
- 結論
8. 網路取證
- 什麼是網路取證?
- 收集網路流量作為證據
- 保護和保存基於網路的證據
- 分析基於網路的證據
- 提出和辯護結論
- 結論
III. 內部入侵
9. 流量威脅評估案例研究
- 初步發現
- 理解 Argus 輸出
- Argus 與 Awk 的結合
- 檢查 TCP 445 埠流量
- 目標是否被攻擊?
- 追蹤內部受害者
- 移至完整內容數據
- 將即時響應數據與網路證據關聯
- 結論
10. 惡意機器人
- IRC 機器人的介紹