亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 108-111.html

?? 入侵檢測的相關(guān)教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=3//-->
<!--PAGES=108-111//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="106-108.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="111-112.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Audit consolidation is performed by the emitter daemon running on each node and the collector daemon on the audit server. Both daemons support configuration files in which the output format, filters, and log file characteristics can be defined. Audit records include a sufficient amount of information, roughly equivalent to what is found in audit records from the base operating system. APIs are provided for accessing the audit records in binary form. The events reported in normal auditing of SeOS are primarily access control events or login events.
</P>
<P>How does SeOS decide what to audit? When users or resources are defined, the security administrator sets the audit characteristics for those entities. Again, the events for users might be successful or unsuccessful logins. For resources such as files, events include access successes or failures. Individual file auditing is thus supported. Resource access can be set to <I>notify</I> so that each time someone accesses a particular file, for example, e-mail can be sent to a set of addresses. At this time, the response capability does not seem to be configurable, although custom responses are possible in the TME Event Console when SeOS is used as part of Tivoli&#146;s Security Manager product.</P>
<P>Audit logs can be scanned or reported on using CLI or the interactive GUI. A separate audit server is not required. The audit logs can be examined on each system. Filters include the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Login/audit ID
<DD><B>&#149;</B>&nbsp;&nbsp;Terminal or workstation (if network attached)
<DD><B>&#149;</B>&nbsp;&nbsp;Originating host (for consolidated logs)
<DD><B>&#149;</B>&nbsp;&nbsp;Resource class
<DD><B>&#149;</B>&nbsp;&nbsp;Start/stop dates and times
<DD><B>&#149;</B>&nbsp;&nbsp;Status (success, failure, warning, and notify)
<DD><B>&#149;</B>&nbsp;&nbsp;IP service name, port
<DD><B>&#149;</B>&nbsp;&nbsp;Trusted program name
<DD><B>&#149;</B>&nbsp;&nbsp;Startup/shutdown
<DD><B>&#149;</B>&nbsp;&nbsp;SeOS administrator name
</DL>
<P>Filters for viewing audit records can be wildcards or specific entries. Indeed, for many of the fields in a given access control constraint, wildcards are accepted. Possibilities include &#147;Joe can access file /home/foo only when requested through program /bin/v*.&#148;
</P>
<P>The Trace log is similar to the audit log and can be configured to store its output in the audit log. Trace logs include more detailed information including process create, fork, exec, process death, setuid() calls, setgid() calls, and more as the documentation claims. Many of the Trace events are SeOS related. These events include administrator activities such as &#147;user XYZ ran the seadmin command with these parameters&#133;&#148; The entire set of Trace messages provided is contained in roughly 25 pages of documentation in a SeOS publication appendix.</P>
<H4 ALIGN="LEFT"><A NAME="Heading25"></A><FONT COLOR="#000077">Other SeOS Features</FONT></H4>
<P>SeOS protects against su, SUID, and SGID escalation with access control rules. Individual SUID programs can be limited with the types of variables described in this chapter (user, group, time of day, and so on). SeOS will scan the system for SUID programs, for example, or you can enter names individually. This additional level of access security addresses some of the concerns regarding SUID and SGID programs. An administrator can specify some very complex predicates that are used to limit normal user access to privileged programs. Because hackers often look for privileged programs to exploit, this feature is valuable. One simple approach is to disallow running of privileged programs from users that login remotely. This approach actually requires some fine tuning, because programs such as e-mail fall into this category.
</P>
<P>Many customers complain about UNIX because it permits the same user to log in more than once simultaneously to the same system. Others see this feature as an advantage. In any event, like mainframes, SeOS can limit individual users to a single active login session per node.</P>
<P>SeOS can be configured to disable logins based on failed login attempts. Flexibility exists in how this can be done. For example, <I>N</I> failed logins from a given source would block logins only from that source IP address, terminal, or X-station. Although most operating systems support login disabling after a configured number of failures, blocking from a specific source is designed to reduce the denial of service threats due to login failures. (Remember this from Chapter 2?)</P>
<H3><A NAME="Heading26"></A><FONT COLOR="#000077">Going beyond SeOS</FONT></H3>
<P>The <I>Tivoli Management Environment</I> (TME) layers a uniform security model on heterogeneous operating systems. Like the individual privileges or rights that a user on NT can be assigned, the TME security model supports granular privileges using a <I>role-based model</I>. Role-based access control is both a practical and a research topic, meaning that you can find both commercial products and formal papers about the area. Essentially, a role is a collection of operations or privileges. A user can belong to one or more roles. When an operation is initiated by the user, various access rights are verified based on the roles assumed by the user.</P>
<P>A role-based architecture, such as the one provided by TME, is flexible enough to permit arbitrary definitions of roles beyond the predefined set in NT, for example. Roles can be defined for the operating system as well as for application-level programs. Depending on the situation, a program may need to be modified to be aware of the role-based model, or the model can be layered over an existing environment including much of the UNIX operating system. Unfortunately, when layered over UNIX, the root access problem still persists. That is, you or a hacker can always bypass the processes on the system implementing the layered approach and work directly with system programs or processes. Still, role-based architectures provide promise for access granularity for systems management and application programs beyond what is delivered in off-the-shelf operating systems today.</P>
<H3><A NAME="Heading27"></A><FONT COLOR="#000077">Why You Still Need Intrusion Detection</FONT></H3>
<P>One of the main points to remember from this chapter is that the success of access control depends heavily upon knowing the subject of the request. Who the system thinks you are is controlled at login time by I&#38;A processes detailed in the preceding chapter. In this chapter, you also saw how you could change <I>who</I> you are in the system through privilege escalation in UNIX and impersonation in NT. As part of the normal activities on a system, various programs increase and decrease their privileges on a regular basis. <I>This basic behavior is one of the most often exploited characteristics of systems</I>. <I>Hackers look for weaknesses in privileged programs to gain superuser access to a system</I>.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="106-108.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="111-112.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一二三区精品福利视频| www..com久久爱| 欧美三级视频在线| 综合精品久久久| 日本sm残虐另类| 欧美影院一区二区| 亚洲少妇30p| 色视频一区二区| 亚洲精品日韩专区silk| 一本色道a无线码一区v| 久久久国产精华| 成人午夜电影小说| 国产精品三级电影| 粉嫩av一区二区三区在线播放| 久久色视频免费观看| 国产91精品一区二区| 国产蜜臀97一区二区三区| 成人免费毛片app| 亚洲三级理论片| 欧美久久久久免费| 久久成人久久爱| 亚洲欧洲国产日韩| 欧美日韩黄色影视| 国产在线播放一区| 久久新电视剧免费观看| 色哟哟精品一区| 蜜臀av一区二区在线观看 | 狠狠色综合日日| 日韩精品亚洲一区二区三区免费| 日韩精品一区国产麻豆| 懂色av噜噜一区二区三区av| 亚洲一区二区三区影院| 精品99一区二区| 欧洲人成人精品| 国产成人h网站| 老鸭窝一区二区久久精品| 国产精品女人毛片| 51精品秘密在线观看| av欧美精品.com| 久久 天天综合| 亚洲一区二区三区美女| 日韩美女视频19| 亚洲人成影院在线观看| 久久色在线观看| 久久亚洲精品国产精品紫薇| 日韩一级二级三级| 日韩欧美国产系列| 日韩欧美一区二区久久婷婷| 日韩欧美亚洲一区二区| 精品国产一区二区三区不卡| 日韩欧美黄色影院| 精品国产网站在线观看| 久久这里都是精品| 成人免费毛片片v| 一本久久a久久精品亚洲| 成人午夜短视频| 国产成人超碰人人澡人人澡| 国产成人av一区二区| 国产成人免费9x9x人网站视频| 成人午夜视频在线观看| 91成人国产精品| 7799精品视频| 国产精品素人一区二区| 天堂成人免费av电影一区| 麻豆一区二区三| 91网站在线播放| 日韩一区二区麻豆国产| 亚洲蜜臀av乱码久久精品| 亚洲美女视频在线| 蜜桃av噜噜一区| av高清久久久| 精品少妇一区二区三区在线视频| 国产精品三级av| 欧美aⅴ一区二区三区视频| 欧美成人一区二区三区| 国产区在线观看成人精品| 国产欧美一区二区三区鸳鸯浴| 亚洲日本欧美天堂| 国产精品传媒入口麻豆| 亚洲制服丝袜av| 日韩一区二区影院| 国产一区二区按摩在线观看| 777xxx欧美| 粉嫩aⅴ一区二区三区四区| 亚洲欧美日韩国产另类专区| 欧美影片第一页| 国产麻豆9l精品三级站| 中文字幕一区二区在线观看| 欧美日韩国产一级片| 激情综合一区二区三区| 国产精品初高中害羞小美女文 | 亚洲高清视频的网址| 日韩欧美在线综合网| 成人深夜福利app| 亚洲一级二级在线| 欧美国产一区二区| 日韩一区二区免费在线观看| 99久久久精品免费观看国产蜜| 另类人妖一区二区av| 亚洲综合一区二区| 国产精品久久久久久久久免费相片| 欧美精品色一区二区三区| 99免费精品视频| 青娱乐精品在线视频| 亚洲最大成人网4388xx| 久久久精品tv| 久久亚洲精品国产精品紫薇 | 91麻豆精品国产91久久久更新时间| 国产精品亚洲人在线观看| 精品一区二区三区免费| 日韩精品国产精品| 日韩一区欧美二区| 午夜视黄欧洲亚洲| 日韩中文字幕麻豆| 有坂深雪av一区二区精品| 亚洲欧洲综合另类在线| 中文字幕中文乱码欧美一区二区| 国产三区在线成人av| 2022国产精品视频| 久久精品一区二区三区不卡牛牛| 日韩欧美视频一区| 精品理论电影在线| 中国色在线观看另类| 国产精品毛片久久久久久| 中文无字幕一区二区三区| 日本一区二区三区视频视频| 亚洲国产精品精华液2区45| 欧美激情一区在线观看| 亚洲蜜桃精久久久久久久| 一区二区三区在线看| 午夜视频一区在线观看| 黄一区二区三区| 99久久99久久精品国产片果冻 | 色久综合一二码| 欧美日韩视频在线观看一区二区三区| 91精品国产乱码久久蜜臀| 久久久精品综合| 亚洲国产你懂的| 九九九精品视频| 91丨九色丨蝌蚪富婆spa| 欧美一区二区视频在线观看2022| 精品日韩欧美一区二区| 亚洲女爱视频在线| 久久成人精品无人区| 色综合一个色综合亚洲| 欧美一级片免费看| 亚洲欧美福利一区二区| 精品在线你懂的| 欧美猛男超大videosgay| 国产农村妇女精品| 日韩在线一区二区| 日本国产一区二区| 亚洲国产精品黑人久久久| 日韩精品色哟哟| 欧美精品乱码久久久久久按摩| 中文字幕二三区不卡| 国产在线精品一区在线观看麻豆| 色综合久久中文字幕| 国产三级精品三级| 国产一区二区三区免费播放 | 亚洲国产成人精品视频| 粉嫩欧美一区二区三区高清影视| 日韩一区二区三区免费看| 一区二区三区av电影| av色综合久久天堂av综合| 久久精品欧美一区二区三区不卡| 蜜桃av一区二区| 日韩一区二区三区视频在线观看 | 欧美日韩一本到| 亚洲成人动漫在线免费观看| 在线精品国精品国产尤物884a| 亚洲欧美日韩电影| 精品视频123区在线观看| 亚洲午夜电影在线观看| 日本高清不卡aⅴ免费网站| 亚洲线精品一区二区三区| 欧美唯美清纯偷拍| 久久国产精品99久久人人澡| 日韩视频在线永久播放| 国产精品99久久久久久有的能看| 欧美激情在线一区二区| 99久久久久久| 日本不卡不码高清免费观看| 精品国产一区二区三区不卡 | 色婷婷久久久亚洲一区二区三区| 亚洲日本中文字幕区| 欧美日本一道本| 国产美女久久久久| 亚洲自拍偷拍图区| 欧美r级在线观看| 一本大道久久a久久精二百| 性做久久久久久免费观看欧美| 欧美哺乳videos| 99热精品国产| 久久超碰97中文字幕| 亚洲免费观看高清完整版在线| 欧美一区二区三区小说| 9i在线看片成人免费| 九一九一国产精品| 亚洲免费在线播放|