亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 136-139.html

?? 入侵檢測的相關(guān)教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
			<option value="/reference/dir.networkservices1.html">Networks 
			<option value="/reference/dir.operatingsystems.html">OS
			<option value="/reference/dir.productivityapplications1.html">Prod Apps
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=4//-->
<!--PAGES=136-139//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="134-136.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="139-141.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B>How Likely Is Impersonation?</B></FONT></P>
<P>Executing a successful address impersonation attack depends on several factors. First, the hacker must be able to drop packets with forged addresses onto the IP stack either by writing a program or using one of the readily available tools for doing so. Next, the location of the user&#146;s attacking station must be such that it is possible for the forged packet to be delivered. Some network routers and firewalls are configured to drop a packet unless the source address of the packet is within a range, fits a pattern, or matches an entry in a table. Therefore,  the network on which the attacker is working may not deliver the packet beyond the attacker&#146;s network boundary. If such filters exist on the network, the hacker also needs to compromise the filter source (firewall or router). Because many ISPs do not bother to block outbound source address impersonation, attacks often originate from public Internet provider locations.
</P>
<P>When the attacker&#146;s node is on the same subnet as the forged address, the impersonation attack is easier. The same is true if (as standard policy) the faked packets are routed to the subnet of the attacked node, such as the routing of packets between subnets of a university network.</P>
<P>What else is necessary if the goal is to <I>receive</I> traffic for a forged node and not just flood the victim with ICMP Reply messages? The simple answer is that the impersonated system must be unable to carry out its half of the communication session. The forged node must be unavailable. You can disable a node in a number of ways. The hacker with physical access can walk up to the node and turn it off. As a fallback, the node can be flooded with network packets, even from another dedicated node acting in cohort with the attacker&#146;s node.</P>
<P><FONT SIZE="+1"><B>Open Networks and Denial-of-Service Attacks</B></FONT></P>
<P>Can you stop an unknown person from continually barraging your publicly published phone number with prank calls? Unfortunately, the answer is &#147;No.&#148; A determined person can reprogram cell phone numbers, migrate from one public pay phone to another, enlist the help of numerous helpers to initiate calls from public phones all over the world, or choose from a variety of other techniques that hide true identity. This is the problem with anonymous source connections. Only if you forced all inbound calls to your house to provide strong authentication could you prevent this attack. Oh, you also can request an unlisted number, but that would hardly be useful if the phone number was for your business. <I>If the number must be public, you can do little to prevent denial-of-service attacks</I>.</P>
<P>The corollary in the Internet is true as well. If you have a publicly visible IP address, such as the one that identifies your business Web server to the world, you always will be open to some denial-of-service attacks. Some threats can be lessened by putting a filter, such as a router that blocks known denial-of-service attacks, between your node and the Internet. However, the attack has merely been shifted to the router, which will be burdened with analyzing and dropping the attack packets. Your Web server throughput will still be lessened if someone is launching denial-of-service packets in your direction.</P>
<P><FONT SIZE="+1"><B>Impersonation and Tracking</B></FONT></P>
<P>Another unfortunate consequence of open networks is that tracing activities to a specific, prosecutable individual is very difficult. A serious hacker will obtain stolen credit cards, use these to obtain Internet access from ISPs, and launch attacks from these accounts even if address impersonation is not needed. Poor physical and configuration security at publicly available Internet terminals also offer nodes from which address impersonation attacks can be launched. As long as the network is open by design, and anonymous connections are permitted, true accountability for network behavior will remain illusive.
</P>
<P>Address impersonation is a particularly threatening attack because it can lead to loss of confidentiality, integrity, and availability. A hacker, who can trick another node into sending information, might be able to gain access to confidential information such as passwords. The ability to fake an address and inject forged messages into the network can be used to trick another node into altering data and violating its integrity. Finally, the pizza attack shows how availability can be impacted. All of these concerns about IP can be summed up in one statement:</P>
<DL>
<DD><I>Authentication based only on IP address is not secure unless cryptography is added to prove the authenticity of the addresses</I>.
</DL>
<H4 ALIGN="LEFT"><A NAME="Heading19"></A><FONT COLOR="#000077">IPsec</FONT></H4>
<P>To improve upon the security of IP, the IPsec standard was introduced. The purpose of IPsec is to provide confidentiality, integrity, authentication, and nonrepudiation of IP packets in a network. The design of IPsec is flexible enough to support a variety of encryption and hashing algorithms to protect the packets. At the heart of IPsec is the notion of a <I>security association</I> between two endpoints. The security association contains various parameters about the communication exchange including cryptographic algorithm options and choices, as well as session status information. IPsec does not define how the keys used in the session are obtained.</P>
<P>IPsec provides two alternatives called <I>Authentication Header</I> (AH) and <I>Encapsulation Security Payload</I> (ESP).</P>
<P><FONT SIZE="+1"><B>Authentication Header</B></FONT></P>
<P>If the environment is trying to prevent only tampering or impersonation of IP headers, and consequently of IP addresses, AH is sufficient. A cryptographic hash can be computed on the IP header and attached to the IP packet to provide authenticity and integrity. If public-key cryptography is exploited, nonrepudiation is also guaranteed. All values in the packet appear in the clear with AH because privacy is not a concern.
</P>
<P>How does this prevent address impersonation? Each half of the session shares a secret key. The packets sent between the communication endpoints are protected with a digital signature or secure message hash. In the simplest case, a cryptographic checksum is added to each packet to ensure its authenticity and optionally its integrity. Without knowledge of the secret key, impersonation is impossible. IPsec also provides facilities to prevent replay attacks based on previously authenticated packets.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="134-136.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="139-141.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩一区中文字幕| 欧美视频中文一区二区三区在线观看| 久久精品夜夜夜夜久久| 国产成人自拍在线| 一区二区三区四区五区视频在线观看 | 中文字幕高清不卡| 一本久久a久久免费精品不卡| 一卡二卡三卡日韩欧美| 精品三级av在线| 一本一道久久a久久精品综合蜜臀| 图片区小说区区亚洲影院| 久久女同精品一区二区| 91麻豆精品视频| 男女性色大片免费观看一区二区| 中文字幕精品综合| 欧美日韩一区二区三区免费看 | 成人av电影在线观看| 在线视频欧美精品| 国产福利一区二区三区视频在线| 一区二区三区蜜桃网| 久久久国产精品不卡| 日韩一级欧美一级| 在线视频欧美精品| 成人美女在线视频| 国内精品第一页| 免费高清视频精品| 五月开心婷婷久久| 一区av在线播放| 一区二区三区小说| 日韩一区欧美一区| 国产精品久久久久久久久免费樱桃| 欧美大片在线观看| 日韩女优av电影在线观看| 欧美日韩国产精选| 欧美精品高清视频| 欧美欧美欧美欧美首页| 色综合中文字幕| 91免费视频大全| 色综合中文字幕| 91丨九色porny丨蝌蚪| 91免费视频网| 欧美色综合网站| 在线播放中文字幕一区| 欧美喷潮久久久xxxxx| 91麻豆精品国产自产在线 | 久久99精品久久久久久久久久久久 | 国产亚洲精品资源在线26u| 久久色在线观看| 国产三级一区二区| 国产精品久久久久久久久快鸭 | av色综合久久天堂av综合| 成年人午夜久久久| 91蝌蚪porny成人天涯| 欧美视频中文字幕| 91精品国产日韩91久久久久久| 91精品麻豆日日躁夜夜躁| 欧美一区二区三区系列电影| 91精品婷婷国产综合久久| 日韩欧美另类在线| 欧美国产日韩一二三区| 国产精品国产三级国产aⅴ原创| 日韩理论片在线| 蜜桃在线一区二区三区| 国产成人免费视频网站高清观看视频 | 久久伊人蜜桃av一区二区| 国产日韩欧美精品一区| 亚洲精品少妇30p| 免费观看在线综合色| 国产白丝网站精品污在线入口| a美女胸又www黄视频久久| 欧美在线制服丝袜| 国产欧美一区视频| 日本视频中文字幕一区二区三区| 国产在线视频精品一区| 91视频观看视频| 久久只精品国产| 色成年激情久久综合| 久久久久国产精品厨房| 亚洲成av人**亚洲成av**| 国产风韵犹存在线视精品| 9191成人精品久久| 1024国产精品| 久久成人免费网站| 欧美日韩国产首页在线观看| 国产欧美精品一区二区色综合| 婷婷开心激情综合| bt7086福利一区国产| 久久久精品国产免大香伊| 日韩国产欧美在线播放| 色婷婷综合五月| 国产精品女上位| 国产九九视频一区二区三区| 91精品国产色综合久久ai换脸| 亚洲欧美国产77777| 99国产精品久| 国产精品―色哟哟| 国产剧情一区在线| 久久新电视剧免费观看| 日韩电影在线一区| 欧美夫妻性生活| 日韩电影免费在线看| 欧美视频一区二区三区| 香蕉av福利精品导航| 色视频成人在线观看免| 综合在线观看色| 91蜜桃网址入口| 亚洲激情av在线| 欧美日韩久久久一区| 一区二区三区在线免费播放| 91蜜桃在线免费视频| 综合久久给合久久狠狠狠97色| 精品一区二区三区日韩| 久久综合九色综合久久久精品综合| 午夜精品福利一区二区蜜股av| 欧美二区乱c少妇| 香蕉久久夜色精品国产使用方法| 欧美日韩一区二区三区四区| 蜜桃久久精品一区二区| 欧美mv日韩mv| 国产黄色91视频| 国产精品久久久久久久久动漫| www.性欧美| 亚洲va韩国va欧美va精品| 3d动漫精品啪啪一区二区竹菊 | 性做久久久久久久久| 欧美男男青年gay1069videost | 中文字幕一区二区三| 欧美美女一区二区三区| 久久爱另类一区二区小说| 久久久久久电影| 欧美亚洲国产怡红院影院| 韩国三级中文字幕hd久久精品| 中文字幕av一区二区三区高| 99视频有精品| 五月天激情综合| 日韩视频一区二区| 91捆绑美女网站| 毛片基地黄久久久久久天堂| 国产精品美女久久久久aⅴ | 国产精品成人网| 777久久久精品| 色综合婷婷久久| 日韩和欧美一区二区三区| 国产精品毛片久久久久久久| 欧美日韩亚洲综合一区二区三区| 男男gaygay亚洲| 亚洲色图丝袜美腿| 日本一区二区视频在线| 91精品国产综合久久精品app| 国产成人综合精品三级| 五月激情综合网| 亚洲午夜一区二区| 国产精品18久久久久久vr| 亚洲成人午夜影院| 国产无遮挡一区二区三区毛片日本| 在线观看国产一区二区| 成人动漫av在线| 国产成人在线观看免费网站| 视频在线观看国产精品| 亚洲色大成网站www久久九九| 欧美国产成人精品| 久久综合色鬼综合色| 欧美一区二区三区在线看| 欧美视频一区二区在线观看| 日本丰满少妇一区二区三区| 国产成a人亚洲精品| 国产一区视频在线看| 精品一区二区三区在线观看| 日本成人在线视频网站| 天堂一区二区在线| 亚洲高清免费观看 | 91成人免费网站| 99久久综合国产精品| 国产成人在线观看免费网站| 久久丁香综合五月国产三级网站| 午夜精品久久久久久久99水蜜桃| 亚洲一级二级在线| 亚洲综合色区另类av| 亚洲精品福利视频网站| 亚洲精品水蜜桃| 国产精品美女久久久久aⅴ | 中文字幕一区二区不卡| 中文字幕在线观看一区| 国产精品国产三级国产普通话蜜臀 | 91色porny| 91丝袜美腿高跟国产极品老师 | 亚洲精品videosex极品| 亚洲成人午夜电影| 看片网站欧美日韩| 国产suv精品一区二区三区| 国产不卡一区视频| 在线观看欧美日本| 欧美电影在哪看比较好| 欧美高清hd18日本| 欧美一级夜夜爽| 久久婷婷国产综合精品青草| 日本一区二区三区在线观看| 中文字幕不卡三区| 婷婷亚洲久悠悠色悠在线播放| 极品少妇xxxx精品少妇偷拍 |