Intrusion Prevention And Active Response: Deploying Network And Host Ips
暫譯: 入侵防護與主動回應:部署網路與主機 IPS

Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin

  • 出版商: Syngress Media
  • 出版日期: 2005-02-01
  • 定價: $1,650
  • 售價: 5.0$825
  • 語言: 英文
  • 頁數: 424
  • 裝訂: Paperback
  • ISBN: 193226647X
  • ISBN-13: 9781932266474
  • 相關分類: Cisco資訊安全
  • 立即出貨(限量) (庫存=2)

買這商品的人也買了...

相關主題

商品描述

 Description:

From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercial and open source intrusion prevention solutions. This is the first book-length work that specifically concentrates on the concept, implementation, and implications of intrusion prevention and active response. The term IPS has been thrown around with reckless abandon by the security community. Here, the author team works to establish a common understanding and terminology, as well as compare the approaches to intrusion prevention.

· Transition from Intrusion Detection to Intrusion Prevention
Unlike IDS, IPS can modify application-layer data or perform system call interception.

· Develop an Effective Packet Inspection Toolbox
Use products such as the Metasploit Framework as a source of test attacks.

· Travel Inside the SANS Internet Storm Center
Review packet captures of actual attacks, like the “Witty” worm, directly from the handler’s diary.

· Protect Against False Positives
Remember that, unlike an IDS, an IPS will REACT to an intrusion.

· Integrate Multiple Layers of IPS
Create a multivendor defense at the Data Link, Network, Transport, and Application layers.

· Deploy Host Attack Prevention Mechanisms
Includes stack hardening, system call interception, and application shimming.

· Implement Inline Packet Payload Alteration
Use Snort Inline or a Linux kernel patch to the Netfilter string match extension.

· Covers all Major Intrusion Prevention and Active Response Systems
Includes Snort Inline, SnortSAM, PaX, StackGuard, LIDS, FWSnort, PSAD, Enterasys Web IPS, and mod_securit.

· Deploy IPS on Web Servers at the Applications Layer
The loading of an application-level IPS in process by the Web server will protect the server and inspect encrypted traffic.

 

 

Table of Contents:

Foreword by Stephen Northcutt

Intrusion Prevention and Active Response

Packet Inspection for Intrusion Analysis

False Positives and Real Damage

Four Layers of IPS Actions

Network Inline Data Modification

Protecting Your Host Through the Operating System

IPS at the Application Layer

Deploying Open Source IPS Solutions

IPS Evasion Techniques

Your Solutions Membership Gives You Access to:

A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page

“From the Author” Forum where the authors post timely updates and links to related sites

The complete code listings from the book

Downloadable chapters from these best-selling books:

Microsoft Log Parser Toolkit

Aggressive Network Self-Defense

Black Hat Physical Device Security

Buffer Overflow Attacks: Detect, Exploit, Prevent

商品描述(中文翻譯)

**描述:**

來自 SANS Institute 培訓與認證主任 Stephen Northcutt 的前言

在 Gartner 發表臭名昭著的「入侵偵測已死」報告的一年內,我們開始看到在現實世界中實際運作的入侵防護系統(IPS)產品。安全專業人士將在接下來的一兩年內向管理層尋求資金,以採購入侵防護設備,特別是來自 3Com(TippingPoint)的智能交換機,以及像 Cisco Security Agent、Platform Logic、Ozone 或 CrossTec 這樣的主機型入侵防護解決方案。管理者和安全技術人員面臨著迫切需要迅速了解商業和開源入侵防護解決方案的需求。這是第一本專門集中於入侵防護和主動回應的概念、實施及其影響的書籍。安全社群對 IPS 這個術語的使用相當隨意。在這裡,作者團隊努力建立共同的理解和術語,並比較入侵防護的方法。

· 從入侵偵測轉向入侵防護
與 IDS 不同,IPS 可以修改應用層數據或執行系統調用攔截。

· 開發有效的封包檢查工具箱
使用 Metasploit Framework 等產品作為測試攻擊的來源。

· 走進 SANS 網際網路風暴中心
直接從處理者的日記中回顧實際攻擊的封包捕獲,例如「Witty」蠕蟲。

· 防範誤報
記住,與 IDS 不同,IPS 將對入侵做出反應。

· 整合多層 IPS
在數據鏈路、網路、傳輸和應用層創建多供應商防禦。

· 部署主機攻擊防護機制
包括堆疊加固、系統調用攔截和應用程序修補。

· 實施內聯封包有效負載修改
使用 Snort Inline 或對 Netfilter 字串匹配擴展的 Linux 核心補丁。

· 涵蓋所有主要的入侵防護和主動回應系統
包括 Snort Inline、SnortSAM、PaX、StackGuard、LIDS、FWSnort、PSAD、Enterasys Web IPS 和 mod_security。

· 在應用層的網頁伺服器上部署 IPS
在網頁伺服器中加載應用層 IPS 將保護伺服器並檢查加密流量。

**目錄:**

前言由 Stephen Northcutt
入侵防護與主動回應
入侵分析的封包檢查
誤報與實際損害
四層 IPS 行動
網路內聯數據修改
通過操作系統保護您的主機
應用層的 IPS
部署開源 IPS 解決方案
IPS 逃避技術
您的解決方案會員資格讓您獲得:
一個綜合的 FAQ 頁面,將本書的所有要點整合成易於搜尋的網頁
「來自作者」論壇,作者在此發布及時更新和相關網站的鏈接
書中的完整代碼清單
可下載的暢銷書章節:
Microsoft Log Parser Toolkit
Aggressive Network Self-Defense
Black Hat Physical Device Security
Buffer Overflow Attacks: Detect, Exploit, Prevent