Honeypots and Routers: Collecting Internet Attacks (Hardcover)
暫譯: 蜜罐與路由器:收集網路攻擊 (精裝版)
Mohssen Mohammed, Habib-ur Rehman
- 出版商: Auerbach Publication
- 出版日期: 2015-12-01
- 售價: $2,600
- 貴賓價: 9.5 折 $2,470
- 語言: 英文
- 頁數: 198
- 裝訂: Hardcover
- ISBN: 1498702198
- ISBN-13: 9781498702195
-
相關分類:
Web-crawler 網路爬蟲、資訊安全
立即出貨 (庫存=1)
商品描述
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment.
Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security:
- Computer networks: technologies, routing protocols, and Internet architecture
- Information and network security: concepts, challenges, and mechanisms
- System vulnerability levels: network, operating system, and applications
The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it.
The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.
商品描述(中文翻譯)
隨著基於互聯網的消費交易數量不斷增加,保護這些交易免受駭客攻擊的需求變得越來越重要。有效的互聯網資訊安全方法是分析攻擊的特徵,以建立防禦策略。本書解釋了如何使用蜜罐(honeypots)和路由器(routers)來實現這一目標。它討論了蜜罐的概念和架構,以及在任何網路環境中部署最佳蜜罐和路由器解決方案所需的技能。
《蜜罐與路由器:收集互聯網攻擊》首先提供了有關互聯網安全的三個主要領域的堅實基礎:
- 計算機網路:技術、路由協議和互聯網架構
- 資訊與網路安全:概念、挑戰和機制
- 系統脆弱性層級:網路、作業系統和應用程式
本書接著詳細說明如何使用蜜罐來捕捉網路攻擊。蜜罐是一種旨在誘使對手攻擊組織資訊系統的系統。本書描述了一種收集蜜罐中互聯網攻擊特徵的技術,並分析這些特徵,以便生成其簽名以防止未來的攻擊。它還討論了路由器在分析網路流量和決定是否過濾或轉發流量中的角色。
本書的最後一部分介紹了設計用於收集零日多形蟲攻擊的實際網路的實施細節。它討論了雙蜜網系統架構的設計、所需的軟體工具以及使用 VMware 的配置過程。通過本書中學到的概念和技能,您將具備在您的網路中部署蜜罐解決方案的專業知識,能夠追蹤攻擊者並提供有關其來源、工具和戰術的寶貴資訊。