OSSEC Host-Based Intrusion Detection Guide
暫譯: OSSEC 主機入侵偵測指南
Andrew Hay, Daniel Cid, Rory Bray
- 出版商: Syngress Media
- 出版日期: 2008-02-01
- 定價: $1,980
- 售價: 5.0 折 $990
- 語言: 英文
- 頁數: 416
- 裝訂: Paperback
- ISBN: 159749240X
- ISBN-13: 9781597492409
-
相關分類:
Operating-system、資訊安全
立即出貨 (庫存=1)
買這商品的人也買了...
-
$880$695 -
$650$514 -
$550$468 -
$1,200$948 -
$350$298 -
$720$569 -
$990$891 -
$600$480 -
$720$612 -
$1,180$1,003 -
$520$343 -
$980$774 -
$620$490 -
$590$466 -
$880$695 -
$620$527 -
$780$616 -
$480$379 -
$580$383 -
$680$578 -
$750$593 -
$720$612 -
$890$703 -
$490$387 -
$755開源安全運維平臺 OSSIM 最佳實踐
相關主題
商品描述
-- Stephen Northcutt
OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This ?picture? captures the most relevant information about that machine's configuration. OSSEC saves this ?picture? and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization.
Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are reading the most accurate, timely, and insightful information on OSSEC.
* Nominee for Best Book Bejtlich read in 2008!
* http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
. Get Started with OSSEC
Get an overview of the features of OSSEC including commonly used terminology, pre-install preparation, and deployment considerations.
. Follow Steb-by-Step Installation Instructions
Walk through the installation process for the "local", "agent", and "server" install types on some of the most popular operating systems available.
. Master Configuration
Learn the basic configuration options for your install type and learn how to monitor log files, receive remote messages, configure email notification, and configure alert levels.
. Work With Rules
Extract key information from logs using decoders and how you can leverage rules to alert you of strange occurrences on your network.
. Understand System Integrity Check and Rootkit Detection
Monitor binary executable files, system configuration files, and the Microsoft Windows registry.
. Configure Active Response
Configure the active response actions you want and bind the actions to specific rules and sequence of events.
. Use the OSSEC Web User Interface
Install, configure, and use the community-developed, open source web interface available for OSSEC.
. Play in the OSSEC VMware Environment Sandbox
Use the OSSEC HIDS VMware Guest image on the companion DVD to implement what you have learned in a sandbox-style environment.
. Dig Deep into Data Log Mining
Take the "high art" of log analysis to the next level by breaking the dependence on the lists of strings or patterns to look for in the logs.
商品描述(中文翻譯)
這本書是關於 OSSEC 主機入侵偵測系統的權威指南,坦白說,要真正使用 OSSEC,你需要一本權威的指南。自 OSSEC 專案開始以來,文檔就已經可用,但由於時間限制,並沒有正式的書籍來概述 OSSEC 產品的各種功能和特性。這使得產品中非常重要且強大的功能未被記錄……直到現在!你手中的這本書將教你如何在你選擇的作業系統上安裝和配置 OSSEC,並提供詳細的範例來幫助防止和減輕對你系統的攻擊。
OSSEC 透過拍攝主機在其原始、未更改狀態下的「照片」來判斷主機是否已被入侵。這張「照片」捕捉了該機器配置的最相關資訊。OSSEC 保存這張「照片」,然後不斷將其與該機器的當前狀態進行比較,以識別任何可能已從原始配置中更改的內容。現在,許多這些變更是必要的、無害的和授權的,例如系統管理員安裝新的軟體升級、補丁或應用程式。但也有一些不那麼無害的變更,例如安裝 rootkit、木馬或病毒。區分無害和不那麼無害的變更決定了系統管理員或安全專業人員是否在管理一個安全、高效的網路,或是一個可能將信用卡號碼傳送給網路釣魚團夥或儲存大量色情內容,為該組織帶來重大責任的被入侵網路。
將有用的與無用的分開絕非易事。因此需要這本書。這本書由 Daniel Cid 共同撰寫,他是免費提供的 OSSEC 主機入侵偵測系統的創始人和首席開發者。因此,讀者可以確信他們正在閱讀有關 OSSEC 的最準確、及時和深刻的資訊。
* 2008 年 Bejtlich 閱讀的最佳書籍提名!
* http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
開始使用 OSSEC
獲取 OSSEC 功能的概述,包括常用術語、安裝前準備和部署考量。
逐步安裝指導
逐步走過在一些最受歡迎的作業系統上進行「本地」、「代理」和「伺服器」安裝類型的過程。
掌握配置
了解你的安裝類型的基本配置選項,學習如何監控日誌檔案、接收遠端訊息、配置電子郵件通知和配置警報級別。
使用規則
使用解碼器從日誌中提取關鍵資訊,以及如何利用規則來提醒你網路上出現的異常情況。
了解系統完整性檢查和 rootkit 偵測
監控二進位可執行檔、系統配置檔和 Microsoft Windows 註冊表。
配置主動回應
配置你想要的主動回應行動,並將這些行動綁定到特定的規則和事件序列。
使用 OSSEC 網頁用戶介面
安裝、配置並使用社群開發的開源網頁介面,該介面可用於 OSSEC。
在 OSSEC VMware 環境沙盒中進行實驗
使用隨附 DVD 上的 OSSEC HIDS VMware 客戶端映像,在沙盒式環境中實施你所學到的知識。
深入挖掘數據日誌挖掘
將日誌分析的「高藝術」提升到下一個層次,打破對日誌中要查找的字串或模式列表的依賴。