logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Snort 2.0 Intrusion Detection

Snort 2.0 Intrusion Detection (Paperback, CD-ROM)

Jay Beale, Brian Caswell (지은이)
Syngress Media Inc
65,000원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
61,750원 -5% 0원
1,860원
59,890원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Snort 2.0 Intrusion Detection
eBook 미리보기

책 정보

· 제목 : Snort 2.0 Intrusion Detection (Paperback, CD-ROM) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9781931836746
· 쪽수 : 550쪽
· 출판일 : 2003-03-30

목차

Foreword

Chapter 1 Intrusion Detection Systems

Introduction

What Is Intrusion Detection

Network IDS

Host-Based IDS

Distributed IDS

A Trilogy of Vulnerabilities

Directory Traversal Vulnerability

CodeRed Worm

Nimda Worm

What Is an Intrusion

Using Snort to Catch Intrusions

Why Are Intrusion Detection Systems Important

Why Are Attackers Interested in Me

Where Does an IDS Fit with the Rest of My Security Plan

Doesn’t My Firewall Serve as an IDS

Where Else Should I Be Looking for Intrusions

What Else Can Be Done with Intrusion Detection

Monitoring Database Access

Monitoring DNS Functions

E-Mail Server Protection

Using an IDS to Monitor My Company Policy

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 2 Introducing Snort 2.0

Introduction

What Is Snort

Snort System Requirements

Hardware

Exploring Snort’s Features

Packet Sniffer

Preprocessor

Detection Engine

Alerting/Logging Component

Using Snort on Your Network

Snort’s Uses

Snort and Your Network Architecture

Pitfalls When Running Snort

Security Considerations with Snort

Snort Is Susceptible to Attacks

Securing Your Snort System

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 3 Installing Snort

Introduction

A Brief Word about Linux Distributions

Debian

Slackware

Gentoo

Installing PCAP

Installing libpcap from Source

Installing libpcap from RPM

Installing Snort

Installing Snort from Source

Customizing Your Installation: Editing the snort.conf File

Installing Snort from RPM

Installation on the Microsoft Windows Platform

Installing Bleeding-Edge Versions of Snort

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 4 Snort: The Inner Workings

Introduction

Snort Components

Capturing Network Traffic

Packet Sniffing

Decoding Packets

Storage of Packets

Processing Packets 101

Preprocessors

Understanding Rule Parsing and Detection Engines

Rules Builder

Detection Plug-Ins

Output and Logs

Snort as a Quick Sniffer

Intrusion Detection Mode

Snort for Honeypot Capture and Analysis

Logging to Databases

Alerting Using SNMP

Barnyard and Unified Output

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 5 Playing by the Rules

Introduction

Understanding Configuration Files

Defining and Using Variables

Including Rule Files

The Rule Header

Rule Action Options

Supported Protocols

Assigning Source and Destination IP Addresses to Rules

Assigning Source and Destination Ports

Understanding Direction Operators

Activate and Dynamic Rule Characteristics

The Rule Body

Rule Content

Components of a Good Rule

Action Events

Ensuring Proper Content

Merging Subnet Masks

Testing Your Rules

Stress Tests

Individual Snort Rule Tests

Berkeley Packet Filter Tests

Tuning Your Rules

Configuring Rule Variables

Disabling Rules

Berkeley Packet Filters

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 6 Preprocessors

Introduction

What Is a Preprocessor

Preprocessor Options for Reassembling Packets

The stream4 Preprocessor

frag2?Fragment Reassembly and Attack Detection

Preprocessor Options for Decoding and Normalizing Protocols

Telnet Negotiation

HTTP Normalization

rpc_decode

Preprocessor Options for Nonrule or Anomaly-Based Detection

portscan

Back Orifice

General Nonrule-Based Detection

Experimental Preprocessors

arpspoof

asn1_decode

fnord

portscan2 and conversation

perfmonitor

Writing Your Own Preprocessor

Reassembling Packets

Decoding Protocols

Nonrule or Anomaly-Based Detection

Setting Up My Preprocessor

What Am I Given by Snort

Adding the Preprocessor into Snort

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 7 Implementing Snort Output Plug-Ins

Introduction

What Is an Output Plug-In

Key Components of an Output Plug-In

Exploring Output Plug-In Options

Default Logging

Syslog

PCAP Logging

Snortdb

Unified Logs

Writing Your Own Output Plug-In

Why Should I Write an Output Plug-In

Setting Up My Output Plug-In

Dealing with Snort Output

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 8 Exploring the Data Analysis Tools

Introduction

Using Swatch

Performing a Swatch Installation

Configuring Swatch

Using Swatch

Using ACID

Installing ACID

Configuring ACID

Using ACID

Using SnortSnarf

Installing SnortSnarf

Configuring Snort to Work with SnortSnarf

Basic Usage of SnortSnarf

Using IDScenter

Installing IDScenter

Configuring IDScenter

Basic Usage of IDScenter

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 9 Keeping Everything Up to Date

Introduction

Applying Patches

Updating Rules

How Are the Rules Maintained

How Do I Get Updates to the Rules

How Do I Merge These Changes

Testing Rule Updates

Testing the New Rules

Watching for Updates

Mailing Lists and News Services to Watch

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 10 Optimizing Snort

Introduction

How Do I Choose What Hardware to Use

What Constitutes “Good? Hardware

How Do I Test My Hardware

How Do I Choose What

Operating System to Use

What Makes a “Good? OS for a NIDS

What OS Should I Use

How Do I Test My OS Choice

Speeding Up Your Snort Installation

Deciding Which Rules to Enable

Configuring Preprocessors for Speed

Using Generic Variables

Choosing an Output Plug-In

Benchmarking Your Deployment

Benchmark Characteristics

What Options Are Available for Benchmarking

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 11 Mucking Around with Barnyard

Introduction 2

What Is Barnyard

Preparation and Installation of Barnyard

How Does Barnyard Work

Using the Barnyard Configuration File

Barnyard Innards

Create and Display a Binary Log Output File

What Are the Output Options for Barnyard

But I Want My Output Like “This?

An Example Output Plug-In

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 12 Advanced Snort

Introduction

Policy-Based IDS

Defining a Network Policy for the IDS

An Example of Policy-Based IDS

Policy-Based IDS in Production

Inline IDS

Where Did the Inline IDS for Snort Come From

Installation of Snort in Inline Mode

Using Inline IDS to Protect Your Network

Summary

Solutions Fast Track

Frequently Asked Questions

Index


저자소개

Jay Beale (지은이)    정보 더보기
호스트 잠금(lockdown)과 보안 감사(audit)를 주로 다루는 보안 전문가다. Linux, HP-UX, Mac OS X용 시스템 보안 강화 스크립트를 만드는 프로젝트인 Bastille의 주 개발자로, Honeynet 프로젝트의 멤버이며 Center for Internet Security의 핵심 참여자다. 현재 JJBSec, LLC의 보안 컨설턴트와 강사로 일하고 있다.
펼치기
Brian Caswell (지은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책