亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 132-134.html

?? 入侵檢測的相關(guān)教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.middleware.html">Middleware
			<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
			<option value="/reference/dir.networkservices1.html">Networks 
			<option value="/reference/dir.operatingsystems.html">OS
			<option value="/reference/dir.productivityapplications1.html">Prod Apps
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=4//-->
<!--PAGES=132-134//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="130-132.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="134-136.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B>Sniffing</B></FONT></P>
<P>The most frequent exploit is simple sniffing of network traffic. When some military and Internet sites were invaded in 1994, it was because users were sending passwords in the clear across untrusted networks. Poorly configured gateways or publicly visible servers would first be compromised by using a buffer overflow attack against an available network application or by guessing passwords. After a normal use account was hacked on the system, a root program vulnerability would give the intruder full access. Sometimes, the vulnerability required a carefully designed buffer overflow attack, but often privileged programs were buggy enough to allow nonprivileged users to execute any arbitrary command.
</P>
<P>When full control was available, the attacker would plant Trojan Horse programs to hide any evidence. This plant would be followed by installing a network sniffer program for capturing other passwords as users would authenticate to or from remote connections.</P>
<P><FONT SIZE="+1"><B>Address Impersonation</B></FONT></P>
<P>Identity in IP is based on the 32-bit source node network address. No authentication is provided in IP for these network addresses. A physical computer might have more than one network adapter installed, and as such, this system will have multiple IP addresses (one for each adapter). On multiuser systems, only a privileged user can change the IP addresses defined for the adapters. The operating system also provides programming interfaces that can be used to talk directly to the IP layer. However, only privileged users are allowed to create IP packets and place them directly on the IP stack for delivery.
</P>
<P>If you have a personal computer or you are the superuser on a system, you can directly place packets on the IP layer. This means that you can set the source IP address field in the packet to any value you desire. The <I>ability to spoof or impersonate IP addresses</I> is one of the greatest threats to network communications. You do not need to be a network programmer to accomplish impersonation. Tools are readily available on the Internet for you to create arbitrary IP packets and send them out across the Internet.</P>
<P><FONT SIZE="+1"><B>Impersonation Attacks</B></FONT></P>
<P>What kinds of mischief can you create if you can spoof IP addresses? The answers range from moderately annoying to very serious.
</P>
<P><FONT SIZE="+1"><B><I>Single Message Attacks</I></B></FONT></P>
<P>Because any user with a PC can send out an arbitrary IP packet, some denial-of-service attacks are launched by sending only a single packet. The attacker does not need to worry about receiving or handling responses from other nodes.
</P>
<P>An old phone trick entails calling successive pizza delivery services and ordering pizzas to be delivered to another person. This attack is an example of impersonating the destination address. Caller ID, call backs, and customer log records appear in the arsenals of restaurants today to prevent this prank. However, in the days when it did succeed, this trick was nasty.</P>
<P>A similar attack increased in frequency on the Internet in early January, 1998. The older version of the attack was launched by faking a source address and sending numerous ICMP packets to different destination addresses. The common ICMP message to send is Echo Request, implemented at the application layer by the <I>ping</I> program. ICMP Echo Request and <I>ping</I> are patterned after the radar. A probe is sent out on the network to test the existence of a particular node by specifying a destination address. If you have access to the <I>ping</I> source code, it is easy to enhance it to cycle through several destination addresses or to ask for a source address. The result is an annoying hacker tool. The node that receives the Echo Request sends an ICMP Echo Reply to the source address that appears in the packet. Instead of getting a few dozen pizzas at the spoofed door, the victim of the attack receives the electronic equivalent&#151;thousands of Echo Reply messages.</P>
<P>The denial-of-service threat caused by this prank reached a new level on the Internet when the ICMP Echo was sent with a broadcast address for the destination. The source address was spoofed as before. To flood a site with network traffic, send ICMP Echo to address 9.8.255.255. The gateway at subnet 9.8 would forward the request to subnets in its network and essentially to every node at the <I>site</I>. The poor node whose address had been impersonated would receive Echo Reply messages from many nodes and probably be unable to perform any useful functions. The network on which this source node was sitting also would experience performance degradation. Also, each of the networks receiving the Echo Request would be congested as all of the nodes tried to send Echo Reply messages. Quite a big mess can be created with relatively few messages. The defenses against this threat require configuration changes in the router or firewall gateway connecting the networks to the Internet. Blocking inbound ICMP requests at the firewall or router, particularly broadcast requests, will help defend against this problem.</P>
<P>Other ICMP messages are sent for flow control of a session, and these also can deny network services to network users. Single message attacks are not limited to ICMP, though.</P>
<P>The Internet and other IP networks are heavily dependent on other service protocols for routing, name resolution (DNS), and gateway configuration changes. Each of these services is provided on the Internet by many dedicated machines that exchange information for keeping the Internet available. Some of these protocols were originally designed to accept unidirectional messages for <I>push</I> updates of information such as routing tables. An attacker could inject a network packet instructing one of these nodes to modify a table entry to assist with future hacking. For example, a packet could tell a DNS nameserver to use the hacker&#146;s network address instead of the true authentication server. Passwords could be stolen for future use if this were to happen. The attack succeeds because early versions of these service protocols relied exclusively on address-based authentication.</P>
<P>Today, more secure versions of these network services employ cryptographic techniques for authentication. Also, careful configurations of controlled networks including routers and firewalls also help protect these sensitive public nodes from frequent attacks.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="130-132.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="134-136.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
最新成人av在线| 亚洲电影中文字幕在线观看| 不卡的av中国片| 一区二区免费在线播放| 国产91色综合久久免费分享| 亚洲国产精品一区二区久久恐怖片| 91精品婷婷国产综合久久性色 | 精品少妇一区二区三区在线播放| 国产又黄又大久久| 亚洲综合视频在线观看| 欧美欧美欧美欧美| 在线视频亚洲一区| 国产精一区二区三区| 成人欧美一区二区三区1314| 欧美精品丝袜久久久中文字幕| 日本免费在线视频不卡一不卡二| 亚洲欧美日韩一区二区三区在线观看| 欧美一区二区精美| 99riav久久精品riav| 国内精品国产三级国产a久久| 亚洲福利视频导航| 亚洲欧美色一区| 亚洲精品一区二区精华| 在线看国产一区| 色综合久久天天综合网| 国产在线精品视频| 亚洲精选视频在线| 成人欧美一区二区三区| 国产亚洲精品bt天堂精选| 欧美日韩成人综合天天影院| 99精品1区2区| 成人免费观看视频| 国内成人免费视频| 免费观看在线综合色| 亚洲一线二线三线视频| 中文字幕中文字幕在线一区 | 国产成人精品三级麻豆| 喷白浆一区二区| 亚洲成在人线免费| 日韩激情中文字幕| 亚洲成人av资源| 亚洲夂夂婷婷色拍ww47| 亚洲美女电影在线| 亚洲国产视频在线| 亚洲va韩国va欧美va| 日本伊人午夜精品| 精久久久久久久久久久| 国产一区二区三区日韩 | 99国产一区二区三精品乱码| av在线综合网| 一本到高清视频免费精品| 色婷婷综合久色| 欧美日韩日日骚| 欧美一区二区播放| 精品毛片乱码1区2区3区| 久久蜜桃av一区精品变态类天堂| 国产日韩欧美精品在线| 亚洲欧洲日韩av| 亚洲成在人线免费| 国产一区二区三区香蕉| 国产成人综合在线观看| 91麻豆福利精品推荐| 欧美日韩一区二区三区不卡| 日韩一区二区三区电影| 久久九九久精品国产免费直播| 国产精品乱码一区二三区小蝌蚪| 亚洲精品自拍动漫在线| 毛片一区二区三区| a亚洲天堂av| 欧美日韩国产区一| 国产日韩欧美激情| 亚洲福利一二三区| 国产一区美女在线| 日本乱人伦一区| 欧美一区二区黄色| 亚洲欧洲日韩在线| 麻豆久久一区二区| 97se狠狠狠综合亚洲狠狠| 欧美一区二区精美| 1000部国产精品成人观看| 污片在线观看一区二区| 国产成人精品综合在线观看| 91久久精品网| 精品99久久久久久| 一区二区高清免费观看影视大全| 秋霞电影一区二区| 99视频在线精品| 久久午夜国产精品| 亚洲午夜久久久久久久久电影网 | 成人久久视频在线观看| 欧美日韩精品一区二区三区四区 | 久久一夜天堂av一区二区三区| 1024成人网| 国产精品1024| 91精品麻豆日日躁夜夜躁| 国产精品素人视频| 日韩电影在线免费看| 不卡电影一区二区三区| 精品国产凹凸成av人网站| 亚洲一区二区三区国产| 风间由美性色一区二区三区| 欧美日韩国产另类不卡| 国产精品福利影院| 久草精品在线观看| 欧美电影一区二区三区| 日韩毛片精品高清免费| 国产一本一道久久香蕉| 日韩一区二区三区观看| 亚洲自拍偷拍图区| 91亚洲国产成人精品一区二区三| 精品久久人人做人人爽| 日韩av电影免费观看高清完整版 | 久久久亚洲精品石原莉奈| 亚洲成av人片| 91蜜桃婷婷狠狠久久综合9色| 久久嫩草精品久久久精品| 美女网站色91| xnxx国产精品| 三级欧美在线一区| 欧美影片第一页| 亚洲人成精品久久久久| 成人精品电影在线观看| 久久人人97超碰com| 久久91精品国产91久久小草| 日韩亚洲欧美中文三级| 天天av天天翘天天综合网色鬼国产| 成人国产亚洲欧美成人综合网| 久久精品亚洲乱码伦伦中文 | 国产91精品久久久久久久网曝门| 日韩一区国产二区欧美三区| 午夜亚洲国产au精品一区二区| 日本高清成人免费播放| 亚洲激情成人在线| 在线免费观看成人短视频| 一区二区在线观看免费视频播放| 91在线国产福利| 亚洲理论在线观看| 欧美最新大片在线看| 亚洲国产欧美日韩另类综合| 欧美日韩免费一区二区三区| 亚洲国产一区视频| 欧美日韩dvd在线观看| 日韩中文字幕av电影| 日韩欧美久久久| 国产精品99久久久久| 日本一区二区三区免费乱视频| 国产精一区二区三区| 国产精品丝袜在线| 在线观看日韩国产| 亚洲丶国产丶欧美一区二区三区| 欧美日本高清视频在线观看| 日韩电影免费一区| 久久午夜老司机| 97精品久久久午夜一区二区三区| 一区二区三区视频在线观看| 欧美午夜电影网| 美女网站一区二区| 国产精品久久免费看| 91片在线免费观看| 天堂在线亚洲视频| 久久久午夜电影| av成人免费在线观看| 亚洲成人自拍网| 精品久久久久久无| 99久久婷婷国产精品综合| 亚洲国产综合色| 精品sm捆绑视频| 色88888久久久久久影院按摩| 日韩电影免费在线看| 亚洲国产成人一区二区三区| 亚洲精品一区二区三区四区高清| 国产一区二三区好的| 亚洲女同一区二区| 欧美一级理论片| 99视频精品全部免费在线| 亚洲成人高清在线| 久久精品亚洲国产奇米99 | 精品日韩av一区二区| 99久久免费精品| 麻豆一区二区99久久久久| 国产精品免费观看视频| 欧美日韩美少妇| www.日韩在线| 麻豆成人91精品二区三区| 最新中文字幕一区二区三区 | 欧美色倩网站大全免费| 经典三级一区二区| 一区二区三区高清| 久久精品这里都是精品| 欧美日韩一区二区三区在线| 懂色中文一区二区在线播放| 亚洲chinese男男1069| 国产精品麻豆一区二区 | 久久久天堂av| 欧美日韩成人综合天天影院| 成人中文字幕电影| 免费成人小视频| 性久久久久久久| 一区二区视频免费在线观看| 日本一区二区三区国色天香 |