亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 139-141.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev
			<option value="/reference/dir.middleware.html">Middleware
			<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
			<option value="/reference/dir.networkservices1.html">Networks 
			<option value="/reference/dir.operatingsystems.html">OS
			<option value="/reference/dir.productivityapplications1.html">Prod Apps
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=4//-->
<!--PAGES=139-141//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="136-139.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="141-143.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B>Encapsulation Security Payload</B></FONT></P>
<P>ESP can provide privacy, integrity, or both using one of two modes. If the entire IP packet is encrypted, and then concatenated to a cleartext version of the IP header before being sent on the network, this is known as <I>tunnel mode</I>. The receiving system uses the decryption key defined by the security association to decrypt the encrypted IP header and packet. Verification of the packet contents depends on successful decryption for privacy or successful hashing for integrity. Privacy for the datagram passed to the IP layer&#151;the data portion of the IP packet&#151;can be implemented separately in <I>transport mode</I>. Because only the datagram from the layer above undergoes cryptographic transformation, and not the IP packet header, performance is improved. Naturally, IPsec is slower than unprotected IP traffic because of the additional path lengths introduced for cryptographic computations and session parameter negotiation. Any packets that do not decrypt properly are dropped. This capability prevents address impersonation attempts.</P>
<H3><A NAME="Heading20"></A><FONT COLOR="#000077">Supporting Protocols for IP</FONT></H3>
<P>A number of other protocols are useful in the IP model. The three most important&#151;ARP, DNS, and RIP&#151;are briefly discussed in the following sections.
</P>
<H4 ALIGN="LEFT"><A NAME="Heading21"></A><FONT COLOR="#000077">Address Resolution Protocol (ARP)</FONT></H4>
<P>Network communications ultimately occur at a layer below IP. The network adapters have unique physical addresses that are needed to deliver the packets between network nodes. A mapping is needed between the conceptual address of IP and the physical address of the adapter. When the Ethernet device driver receives an IP packet for delivery, it sends out a special broadcast packet containing the destination IP address of the IP packet. As part of the behavior of a correctly implemented device driver, a node whose IP address matches sends back a reply with the physical address of its Ethernet adapter. The original node now encapsulates the IP packet into an Ethernet packet and uses the newly found Ethernet address as the target. This is essentially how the ARP works. Different network device drivers might implement ARP using something other than a broadcast, but this is only a slight difference.
</P>
<P>Most nodes cache results from ARP broadcasts for performance. Earlier ARP cache implementations would accept unsolicited ARP replies and update their caches. This form of address impersonation occurs at the physical instead of the IP layer. Indeed, nothing in the ARP protocol provides strong authentication. An impostor can respond with an ARP reply before the true owner and consequently spoof the requesting node. To be successful, the real owner of the IP address must be disabled or at least significantly hindered so that it cannot respond to network messages.</P>
<P>Note that address impersonation at this layer and at the IP layer has beneficial value, too. For cluster or high-availability environments, it is sometimes necessary for one node to impersonate the address of another to support a fail-over relationship. Controlled impersonation like this is unlikely to be configured across unsecure networks, though.</P>
<H4 ALIGN="LEFT"><A NAME="Heading22"></A><FONT COLOR="#000077">Domain Name System (DNS)</FONT></H4>
<P>Dotted decimal addresses are paired with more semantically meaningful names by pairing each octet with an alphanumeric string. The address 198.29.36.126 could be referred to as webserver1.boulder.ibm.com. The association between octets and string names is actually inverted, but this is not an important security issue. Like the decimal addresses, domain names are assigned by a registration authority. DNS is a protocol that is used to manage lookups for converting between dotted decimal and domain name versions of an address. Because the Internet depends heavily on this capability, a group of hierarchically related, tightly controlled <I>nameservers</I> populates the Internet. Each nameserver is responsible for names without a fixed domain but can request name resolution from other nameservers to which it is connected. DNS also defines a protocol for how nameservers communicate and receive updates to their universe of names, or <I>namespace</I>. Each nameserver is identified by one or more IP addresses.</P>
<P>Now that you know you can impersonate IP addresses, you can see that spoofing a nameserver can lead to serious consequences on the Internet. By feeding fake information to a nameserver or by impersonating the nameserver itself, you can intercept and forge traffic for arbitrary nodes. Frequent impersonation attacks against nameservers forced many changes to the programs used to implement DNS, most notably the <I>bind</I> program. Today, most nameservers on the Internet have been upgraded to avoid known attacks, but new threats are sure to arise. Luckily, the maintainer of <I>bind</I> is very responsive and has provided timely fixes to security problems. A good review of DNS is given in Bellovin (1995).</P>
<P>A proposed standard for secure, authenticated DNS has been implemented for some nameservers on the Internet. Trusted Information Systems is a leading vendor in this effort. Secure DNS is achieved by using cryptographic protocols for message exchanges between nameservers. Implementations can be found on the Internet. More details on DNS and how to administer it are available in Link (1995).</P>
<H4 ALIGN="LEFT"><A NAME="Heading23"></A><FONT COLOR="#000077">Routing Interchange Protocol (RIP)</FONT></H4>
<P>Like ARP and DNS, RIP is used to provide message delivery information on the Internet or in private networks. Instead of helping to locate the target of a message, RIP is used to find the best route for a message to travel. RIP suffers from the same problems as insecure DNS in that RIP depends only on the source IP address for I&#38;A of the message. A secure version of RIP is also available.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="136-139.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="141-143.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产日韩欧美亚洲| 国产成人啪免费观看软件| 一本色道a无线码一区v| 国产精品素人视频| k8久久久一区二区三区| 亚洲超碰97人人做人人爱| 国产成a人无v码亚洲福利| 6080日韩午夜伦伦午夜伦| 精品国产乱码久久久久久老虎| ...xxx性欧美| 国产精品69久久久久水密桃| 欧美精品在线一区二区| 亚洲欧洲另类国产综合| 国精产品一区一区三区mba视频| 欧美午夜精品一区二区三区| 亚洲欧洲成人精品av97| 国产剧情一区二区| 日韩精品一区二区三区在线观看 | av在线不卡电影| 欧美一区二区三区免费观看视频| 一区二区三区免费观看| 不卡高清视频专区| 国产日韩三级在线| 黄页视频在线91| 精品日韩一区二区三区 | 国产精品1区二区.| 欧美一区二区精美| 丝袜美腿高跟呻吟高潮一区| 欧美三级在线视频| 一二三区精品视频| 欧美无砖砖区免费| 亚洲综合一区二区精品导航| 91啪亚洲精品| 夜夜夜精品看看| 欧美日本国产视频| 视频一区二区三区在线| 欧美人xxxx| 亚洲成av人在线观看| 欧美精品日韩一区| 琪琪一区二区三区| 精品久久人人做人人爰| 国产精品亚洲成人| 国产精品久久夜| 成人精品电影在线观看| 中文字幕在线观看不卡| 在线视频欧美精品| 午夜电影网亚洲视频| 欧美tickling挠脚心丨vk| 国内精品免费**视频| 国产亚洲视频系列| 91丨porny丨首页| 亚洲成人午夜电影| 久久免费视频色| 北岛玲一区二区三区四区| 亚洲欧美日韩电影| 精品国产乱码久久久久久牛牛| 国产一区二区看久久| 国产精品青草综合久久久久99| 一本大道久久a久久精二百| 性做久久久久久免费观看欧美| 精品精品国产高清a毛片牛牛| 国产毛片精品视频| 亚洲欧美一区二区三区国产精品 | 亚洲高清在线视频| 欧美一区二区三级| 成人免费不卡视频| 香蕉乱码成人久久天堂爱免费| 精品国内片67194| 91亚洲精品乱码久久久久久蜜桃| 丝袜美腿亚洲一区二区图片| 欧美激情在线免费观看| 欧美日韩成人激情| 成人手机电影网| 日韩电影在线观看电影| 中文字幕不卡在线观看| 777午夜精品视频在线播放| 懂色av一区二区夜夜嗨| 亚洲午夜精品网| 国产精品美女久久久久aⅴ国产馆 国产精品美女久久久久av爽李琼 国产精品美女久久久久高潮 | 欧美日韩国产高清一区| 国产一区二区三区在线观看免费| 亚洲精品国产a久久久久久| 欧美大片日本大片免费观看| 91亚洲永久精品| 国产精品一区二区久久不卡 | 亚洲色图视频网站| 欧美电影免费观看高清完整版| 91网站最新网址| 国产一区二区美女诱惑| 蜜臀99久久精品久久久久久软件| 中文字幕中文乱码欧美一区二区| 91精品国产乱码| 欧美在线观看禁18| 93久久精品日日躁夜夜躁欧美| 激情都市一区二区| 亚洲成人av电影| 一区二区在线观看视频| 国产精品天美传媒沈樵| 久久精品一区二区三区不卡| 国产喂奶挤奶一区二区三区| 欧美成人精品1314www| 欧美二区乱c少妇| 欧美午夜影院一区| 欧美影院精品一区| 97精品久久久久中文字幕 | 亚洲国产精品成人综合色在线婷婷| 91精品国产高清一区二区三区蜜臀| 日本丶国产丶欧美色综合| 成人av免费在线观看| 国产成人激情av| 国产高清亚洲一区| 国产成人精品免费| 国产成人免费9x9x人网站视频| 国精品**一区二区三区在线蜜桃| 久久97超碰国产精品超碰| 久久精品国产色蜜蜜麻豆| 美女视频一区在线观看| 蜜臀av一区二区在线免费观看| 男女视频一区二区| 久久99国产精品尤物| 国产一区二区三区最好精华液 | 免费人成精品欧美精品| 人人狠狠综合久久亚洲| 麻豆精品视频在线| 国内精品第一页| 福利电影一区二区| 99久久精品99国产精品| 91亚洲精品一区二区乱码| 91国产免费看| 欧美一区二区视频在线观看| 精品美女在线播放| 中文字幕+乱码+中文字幕一区| 国产精品水嫩水嫩| 中文字幕日本不卡| 亚洲国产一区二区三区| 日本不卡一二三| 国产成人一区二区精品非洲| 99久久久国产精品免费蜜臀| 欧美私模裸体表演在线观看| 日韩一级二级三级| 欧美激情一区二区三区四区| 一区二区三区中文字幕精品精品| 三级欧美韩日大片在线看| 国产在线精品一区二区三区不卡| av不卡一区二区三区| 这里只有精品免费| 中文字幕乱码日本亚洲一区二区| 亚洲欧美日韩在线播放| 日韩高清不卡一区二区三区| 国产成人无遮挡在线视频| 欧美亚洲动漫精品| 精品国产精品一区二区夜夜嗨| 中文字幕在线观看一区| 日本欧美久久久久免费播放网| 丁香另类激情小说| 欧美日本不卡视频| 国产日本欧美一区二区| 亚州成人在线电影| 成人午夜精品在线| 91精品国产综合久久精品性色| 国产三级一区二区三区| 亚洲高清免费观看| www.欧美色图| 精品国产乱码久久久久久久| 亚洲国产一二三| 91小视频在线免费看| 日韩欧美在线观看一区二区三区| 国产精品久久久久影院| 午夜精品久久久久影视| 成人av资源网站| 日韩亚洲欧美综合| 亚洲一区二区中文在线| 成人永久aaa| 欧美zozo另类异族| 亚洲国产毛片aaaaa无费看| 成人视屏免费看| 久久久噜噜噜久久中文字幕色伊伊| 亚洲大片一区二区三区| 91婷婷韩国欧美一区二区| 国产女人18毛片水真多成人如厕 | 91丨九色丨黑人外教| 国产日韩欧美高清| 精品一区二区av| 欧美精选午夜久久久乱码6080| 亚洲欧美国产毛片在线| 国产成人免费视频网站| 久久夜色精品国产噜噜av| 奇米四色…亚洲| 日韩一区二区三区av| 午夜精品成人在线| 欧美人妖巨大在线| 亚洲高清视频在线| 欧美视频完全免费看| 亚洲一区二区三区四区中文字幕 | 日韩精品中文字幕一区二区三区 | 91精品欧美一区二区三区综合在 | 久久只精品国产| 久久精品国产澳门| 2欧美一区二区三区在线观看视频| 视频一区二区不卡|