snort 2.1 intrusion detection, 2nd ed.

753 1.3K 1
snort 2.1 intrusion detection, 2nd ed.

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... book.The authors of this Snort 2.1 Intrusion Detection, Second Edition have produced a book with a simple focus, to teach you how to use Snort, from the basics of getting started to advanced rule configuration, they cover all aspects of using Snort, including basic installation, preprocessor config­ uration, and optimization of your Snort system I hope you can begin to see why I say Snort is one of the best... 416 Summary Scripts 418 snort_ stat.pl 419 Using SnortSnarf 422 Installing SnortSnarf 422 Configuring Snort to Work with SnortSnarf 424 Basic Usage of SnortSnarf 425 Swatch 428 Analyzing Snort IDS Events 431 Begin the Analysis... 72 Using Snort on Your Network 73 Using Snort as a Packet Sniffer and Logger 74 Using Snort as a NIDS 85 Snort and Your Network Architecture 86 Snort and Switched Networks 87 Pitfalls When Running Snort 87 False Alerts 88 Upgrading Snort ... such as: ACID, barnyard, and swatch Snort runs on a large number of hardware platforms and OS configurations, and is one of the most widely ported pieces of security software in the world Analysts with expensive commercial intrusion detection systems still turn to Snort to fill in the gaps The creator of Snort, Marty Roesch, originally envisioned Snort as a lightweight intrusion detection system, and it... Installing Snort 127 A Brief Word about Sentinix GNU/Linux 128 Installing Snort from Source 129 Enabling Features via configure 131 Installing Snort from RPM 132 Installing Snort Using apt 134 Contents Configuring Snort IDS 138 Customizing Your Installation: Editing the snort. conf... ACID (Analysis Console for Intrusion Databases), Barnyard, and swatch Chapters 9 and 10 contain copies of the IDS testing/evasion tools Stick and Snot Chapter 12 is an archive of three active response systems, Snortsam, Fwsnort, and Snort_ inline, which automate the process of responding to attacks in real time Contents Foreword xxix Chapter 1 Intrusion Detection Systems... 606 Active Response vs Intrusion Prevention 607 Active Response Based on Layers 608 Altering Network Traffic Based on IDS Alerts 609 Snortsam 610 Fwsnort 610 Snort_ inline 610 Attack and Response 611 Snortsam 619... Snort 88 xv xvi Contents Considering System Security While Using Snort 89 Snort Is Susceptible to Attacks 90 Detecting a Snort System on the Network 90 Attacking Snort 91 Attacking the Underlying System 92 Securing Your Snort System 92 Summary 94 Solutions... 41 Replace Your Other Protection Mechanisms 42 What Else Can Be Done with Intrusion Detection? 42 Fitting Snort into Your Security Architecture 42 Viruses, Worms, and Snort 43 Known Exploit Tools and Snort 43 Writing Your Own Signatures with Snort 44 Using an IDS to Monitor Your Company Policy 44 Analyzing Your IDS Design... get your Snort tuned up and run­ ning, write a filter and share it, participate in the Snort mailing list, SANS Incidents list, or Security Focus IDS list I will be looking for you to be part of the author team for Snort 3.0 — Stephen Northcutt Director of Training and Certification, The SANS Institute www.syngress.com Chapter 1 Intrusion Detection Systems Solutions in this Chapter: ■ Introducing Intrusion . 007 HJJ3EDC7NB 008 2WMKEE 329 N 009 62T7NC9MW5 010 IM6TGH62N5 PUBLISHED BY Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 023 70 Snort 2. 1 Intrusion Detection, Second Edition. . . . .1 52 Option 2: Using Prepackaged OpenBSD Ports . . . .15 5 Option 3: Installing Snort from Source . . . . . . . . .15 7 Installing Bleeding-Edge Versions of Snort . . . . . . . . .15 9 Summary. James has co-authored or contributed to Snort 2. 0 Intrusion Detection (Syngress, ISBN: 19 318 36744 ) , Hacking the Code:ASP.NET Web Application Security (Syngress, ISBN: 1- 9 322 66-65-8), and Special

Ngày đăng: 25/03/2014, 12:08

Từ khóa liên quan

Mục lục

  • Snort 2 1 Intrusion Detection, Second Edition

    • Cover

    • Contents

    • Foreword

    • Chapter 1 Intrusion Detection Systems

      • Introducing Intrusion Detection Systems

        • What Is an Intrusion?

          • Legal Definitions

          • Scanning vs Compromise

          • Viruses and Worms-SQL Slammer

          • Live Attacks-Sendmail Buffer Overflow

          • How an IDS Works

            • What the IDS Is Watching

            • How the IDS Watches Your Network

            • How the IDS Takes the Data It Gathers and Finds Intrusion Attempts

            • What the IDS Does When It Finds an Attack Attempt

            • Answering Common IDS Questions

              • Why Are Intrusion Detection Systems Important?

              • Why Doesn't My Firewall Serve as an IDS?

              • Why Are Attackers Interested in Me?

                • Automated Scanning/Attacking Doesn't Care Who You Are

                • Desirable Resources Make You a Target

                • Political or Emotional Motivations

                • Where Does an IDS Fit with the Rest of My Security Plan?

                • Where Should I Be Looking for Intrusions?

                  • Operating System Security-Backdoors and Trojans

                  • Physical Security

                  • Application Security and Data Integrity

Tài liệu cùng người dùng

Tài liệu liên quan