亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 309-311.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.hardware1.html">Hardware
			<option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev
			<option value="/reference/dir.middleware.html">Middleware
			<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
			<option value="/reference/dir.networkservices1.html">Networks 
			<option value="/reference/dir.operatingsystems.html">OS
			<option value="/reference/dir.productivityapplications1.html">Prod Apps
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=11//-->
<!--PAGES=309-311//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="307-309.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="311-312.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading4"></A><FONT COLOR="#000077">Responding to Intrusions</FONT></H3>
<P>Garfinkel and Spafford (1996) recommend two important responses. First, remain calm and don&#146;t panic. Psychological research shows that humans do not perform well under stressful conditions, unless the task is one that the human already executes exceptionally well. Professional athletes often perform well under stressful conditions because they already are very good at running, kicking, shooting, or blocking. Chances are the same cannot be said of incident response teams. Thus, it&#146;s important to remain focused on the facts and carry out the plan you&#146;ve already practiced a number of times. The next recommendation is to document <I>everything</I>. There isn&#146;t much elaboration on this point. Just do it.</P>
<P>A different set of suggestions is found in Chapman and Zwicky (1995):</P>
<DL>
<DD><B>1st step: Evaluate the situation and decide what response is required.</B> You do this evaluation by accurately assessing the damage. Ask what the intruder is doing now, how far did the penetration get, what information was compromised, what changes were made to the systems, were back doors left, and other questions that describe the current state of the problem.
<DD><B>2nd step: Disconnect or shut down resources if necessary.</B> As a rule, you do not want to let the hacker continue to work through your systems (see the next section). Responding to an incident is much like disaster recovery. If the compromised system is your public Web server, and you do not have a second site, shutdown may not be an option. At least you should be able to reset or kill the network connection. The hacker may try another network connection later, but you will have eliminated the current threat. Think of it as triage.
<DD><B>3rd step: Analyze and respond to the incident.</B> Here, the importance of teams with designated roles becomes apparent. You cannot have the same team member digging through log files or source code and also worrying about the next weaknesses the attacker will exploit. Part of the team should be responsible for analyzing the problem, and another segment of the team should be attentive to any new incoming threats. When you are ready to repair the problem, thoroughly consider your responses. The last thing you want to do is make the situation worse. Disabling the wrong subnet addresses in your firewall could limit your ability to detect new intrusions while not affecting the hacker at all. That&#146;s why it&#146;s important to remain calm and think through your steps carefully. On most systems, you&#146;ll be working with superuser or Administrator privileges. Have someone look over your shoulder and verbally state each step before you do it to minimize errors.
<DD><B>4th step: Alert other people according to your response policy.</B> You can do this in parallel with the previous steps if your team is large enough. The incident response document you prepared in advance will contain the names, phone numbers, e-mail addresses, pager numbers, and other critical information for the contacts. If you diagnose a problem in a purchased product, contact the vendor&#146;s response team as soon as possible. They already may be working on the problem but have not publicized the issue yet for fear of increasing the number of attacks. Do not leak information outside the response team and those with a need to know. Most crimes involve internal collusion, so your team should not involve other internal employees unless you are sure they were not involved.
<DD><B>5th step: Save the system state.</B> Back up as much of the system as you can in real time. Take the backup to a victim machine on a detached network and restore the image. This machine is where you will do your debugging. Keep in mind any privacy issues with data that may appear on the backup. Medical records and credit card numbers should not be forwarded to vendors for debugging unless adequate controls are in place. Know your legal limits in advance.
<DD><B>6th step: Restore hacked systems.</B> If you have detected that system binaries have changed, restore them from certified original product media. To be safe, you should restore the system from scratch. Note that this restoration can be tricky because a system may have many additional products installed and configured on top of it. Getting the system back into the state before compromise may not be a simple task and could introduce other security problems. If you&#146;ve kept accurate change logs, and your IDS can tell you exactly what has changed, you can get by with replacing only the programs patched by the hacker. Remove any hidden files or directories added by the hacker. Watch out for symbolic links. You don&#146;t want to remove a system file that has a symlink from a file planted by a hacker.
<DD><B>7th step: Document what happened.</B> Communicate the incident as necessary. Carry out a defect prevention process that will ensure that the problem does not occur again. Finally, increase monitoring if necessary. For example, if the incident went undetected for several weeks, you definitely were not monitoring the appropriate activities.
</DL>
<P>In responding to an event, you immediately will be faced with a crucial decision&#151;how to handle the intruder. You have several options. The best advice is to disconnect or kill the network connection. If the event is an internal misuse that was flagged by an IDS, you have different legal options. Upper management will help you decide whether to allow the misuse to continue for gathering evidence (with the appropriate concern for privacy of any compromised information).
</P>
<P>Stories of administrators contacting the intruder are plentiful. In some cases, the intruder was a <I>friendly hacker</I> who offered security advice and described the weaknesses exploited. Because you never know whether you have a curious hacker or a sociopath on the end of the connection, this type of contact can be risky. The intruder might not know what type of evidence could be left behind, and your open acknowledgment of detection could result in a hasty exit that also erases your entire system.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="307-309.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="311-312.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产自产高清不卡| 欧美精品日韩精品| 色又黄又爽网站www久久| 97久久超碰国产精品| 99视频一区二区| 91免费版pro下载短视频| 日本道免费精品一区二区三区| 国产电影一区二区三区| 9久草视频在线视频精品| 91论坛在线播放| 欧美日韩不卡一区| 久久尤物电影视频在线观看| 国产精品福利一区二区| 一区二区三区日韩精品视频| 日韩激情在线观看| 国产精品一区二区不卡| 99国产麻豆精品| 欧美放荡的少妇| 国产日本欧美一区二区| 亚洲最大色网站| 国产精品一区二区果冻传媒| 色8久久人人97超碰香蕉987| 日韩午夜在线观看视频| 日韩伦理av电影| 久久99精品久久久久久国产越南| 91在线播放网址| 中文一区在线播放| 国产伦精品一区二区三区视频青涩| 色偷偷88欧美精品久久久| 日韩欧美视频在线| 亚洲在线视频网站| 国产激情视频一区二区在线观看| 欧美视频在线一区二区三区 | 国产丝袜美腿一区二区三区| 亚洲人成伊人成综合网小说| 国产成人综合视频| 精品国免费一区二区三区| 亚洲成人自拍一区| 欧美精品久久久久久久多人混战| 国产精品理论片| 99久久国产综合精品色伊| 欧美成人a∨高清免费观看| 亚洲韩国精品一区| 色哟哟欧美精品| 亚洲欧洲av一区二区三区久久| 国产大陆a不卡| 欧美激情一区二区三区四区| 国产精品一区二区三区网站| 久久综合国产精品| 国产精华液一区二区三区| 久久精品男人天堂av| 成人av手机在线观看| 一区二区三区欧美激情| 欧美日韩国产一级| 蜜臀av性久久久久av蜜臀妖精 | 国产色产综合色产在线视频| 国产做a爰片久久毛片| 精品福利一二区| 成人午夜电影网站| 亚洲精品久久久蜜桃| 欧美日韩精品高清| 六月丁香婷婷久久| 亚洲国产精品ⅴa在线观看| 一本色道久久综合精品竹菊| 一区二区三区美女| 日韩欧美成人一区二区| 欧美性猛交xxxx黑人交| 日韩不卡手机在线v区| 国产欧美日韩精品在线| 欧美人体做爰大胆视频| 粉嫩嫩av羞羞动漫久久久| 图片区小说区区亚洲影院| 久久精品亚洲精品国产欧美kt∨ | 亚洲va欧美va国产va天堂影院| 国产拍揄自揄精品视频麻豆| 26uuu久久综合| 6080国产精品一区二区| 9191精品国产综合久久久久久| 色诱亚洲精品久久久久久| 国产91富婆露脸刺激对白| 国产精品白丝av| 美女www一区二区| 丝袜美腿一区二区三区| 亚洲视频免费观看| 欧美激情一区在线| 18成人在线视频| 国产精品久久久久久久久免费相片 | 久久国产精品99久久人人澡| 亚洲国产aⅴ天堂久久| 午夜日韩在线观看| 日韩精品一二三| 日韩 欧美一区二区三区| 三级欧美在线一区| 天天综合网天天综合色| 天天免费综合色| 99久久久精品| 久草在线在线精品观看| 狠狠色丁香久久婷婷综合丁香| 国产sm精品调教视频网站| 国产suv精品一区二区883| 成人天堂资源www在线| 国产成人99久久亚洲综合精品| av电影天堂一区二区在线观看| 91高清视频在线| 欧美年轻男男videosbes| 欧美一级高清片在线观看| 久久午夜免费电影| 中文字幕一区二区三区在线播放 | 国产成人一区在线| bt欧美亚洲午夜电影天堂| 欧美日韩激情在线| 久久久另类综合| 中文字幕一区二区三区色视频 | 国产黑丝在线一区二区三区| 视频一区二区三区中文字幕| 韩国女主播成人在线观看| 99久久精品国产导航| 日韩欧美一区在线观看| 国产精品天美传媒| 极品少妇xxxx偷拍精品少妇| 不卡视频在线看| 欧美第一区第二区| 亚洲激情网站免费观看| 国产一区美女在线| 欧美日韩国产大片| 国产精品美女久久久久久久| 久久9热精品视频| 欧美精品乱码久久久久久| 中文字幕精品一区| 免费在线观看视频一区| av电影天堂一区二区在线| 国产亚洲自拍一区| 麻豆精品一二三| 6080午夜不卡| 亚洲成av人片一区二区梦乃| 91啪在线观看| 中文字幕在线观看一区二区| 国产一区二区三区高清播放| 欧美美女黄视频| 亚洲精品欧美激情| 色婷婷国产精品久久包臀| 日韩一区日韩二区| 91美女在线看| 一区二区三区欧美在线观看| 在线精品视频免费观看| 亚洲国产一区二区三区青草影视| 成人免费av网站| 国产日产欧美一区二区视频| 麻豆久久一区二区| 日本韩国一区二区三区视频| 亚洲日本成人在线观看| 一本一本大道香蕉久在线精品 | 一区二区三区精品在线| 99综合电影在线视频| 亚洲欧美视频在线观看视频| av爱爱亚洲一区| 亚洲成人资源网| 日韩精品一区二区三区四区| 日本午夜精品视频在线观看| 久久久欧美精品sm网站| 99国产精品99久久久久久| 亚洲一区二区成人在线观看| 欧美伊人久久久久久午夜久久久久| 亚洲男人天堂av| 26uuu精品一区二区在线观看| 狠狠色2019综合网| 一区二区三区成人在线视频| 久久久精品综合| 欧美日韩精品一区视频| 久久成人av少妇免费| 亚洲美女淫视频| 中文字幕久久午夜不卡| 欧美一区二区在线免费观看| 91麻豆自制传媒国产之光| 国产一区二区三区观看| 麻豆精品一二三| 中文字幕一区二区在线播放 | 久久精品av麻豆的观看方式| 欧美一区二区在线看| 天堂蜜桃一区二区三区 | 日韩午夜精品电影| 欧美日韩大陆一区二区| 91国产视频在线观看| 一本大道av伊人久久综合| 高清av一区二区| 国产河南妇女毛片精品久久久| 久88久久88久久久| 久久成人免费网| 久久国产综合精品| 蓝色福利精品导航| 日本午夜一本久久久综合| 日韩精品一二三四| 日本va欧美va精品| 看片的网站亚洲| 久久www免费人成看片高清| 亚洲成人777| 日韩黄色片在线观看| 免费美女久久99| 国产一区二区剧情av在线| 国产高清不卡一区|