亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 299-302.html

?? 入侵檢測的相關(guān)教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.operatingsystems.html">OS
			<option value="/reference/dir.productivityapplications1.html">Prod Apps
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=10//-->
<!--PAGES=299-302//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="296-298.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch11/303-307.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B>Security Dynamics&#146; KSA and KSM</B></FONT></P>
<P>As part of the rush of IDS vendor acquisitions, Security Dynamics picked up KSA and KSM when it acquired Intrusion Detection, Inc. KSA is a vulnerability assessment tool, and KSM is an NT event log monitor.
</P>
<P>KSA is built upon the consulting theme of <I>Best Practices</I>. A sound security policy states guidelines such as password composition rules, login failure thresholds, password assignments, file access rights, and logging. KSA scans systems for adherence to best practices guidelines and impressively reports results. Six major areas that KSA investigates are: account restrictions, access control, password strength, system monitoring, data integrity, and data confidentiality. Some of the vulnerabilities evaluated by KSA are as follows:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Weak password subject to cracking
<DD><B>&#149;</B>&nbsp;&nbsp;Proper registry settings
<DD><B>&#149;</B>&nbsp;&nbsp;Which NT services are enabled
<DD><B>&#149;</B>&nbsp;&nbsp;Configuration of the auditing subsystem
<DD><B>&#149;</B>&nbsp;&nbsp;Shared network drive configurations
<DD><B>&#149;</B>&nbsp;&nbsp;Trust relationships
<DD><B>&#149;</B>&nbsp;&nbsp;Known down-level versions of programs
</DL>
<P>KSA supports distributed analysis of target nodes with reporting to a central system. Another feature reads the event log and looks for violations such as failed login attempts and other security activities (administrator login events). Interesting events are counted and displayed in graphical bar charts or in printed reports.
</P>
<P>One of the useful additions to KSA is an inverse ACL map. Knowing the resources a user or group can access, and the access rights associated with that resource are both useful reports. Operating systems easily display the object along with the subjects and access rights for that object. However, displaying the opposite view is tedious when attempted manually. KSA provides a view of ACLs from the <I>subject&#146;s perspective</I>, thus showing all resources that a subject can access. This feature, long part of RACF on mainframe computers, is not always available on other operating systems.</P>
<P>The KSM concentrates on event log analysis and alerts. Like eNTrax, the log is read in intervals as short as one minute. Multiple target nodes can have their event logs consolidated on a central console. Because KSM uses the event log, activities such as SYN Flood or Ping of Death are not detected. Network packets are the source of data for these attacks. Events that KSM monitors include logins, logouts, service starts, auditing configuration changes, and file accesses.</P>
<P>KSM ships with alerting capabilities today but does not currently support countermeasures, such as killing processes. This feature is likely to be supported in the future. Like other NT IDSs, the set of attack signatures is limited to those provided by the vendor. The capability to add signatures in the future also will be available. A number of predefined reports are provided with KSM including Most Targeted Machines, Suspicious User Activity, and a Top 10 Most Wanted Users. Data for reports can be limited to date and time ranges as well. Attack patterns analyzed include password cracking attempts, browsing, denial of service, privilege violations, ghost IDs, failed logins or file accesses, masquerading, and Administrator ID abuse.</P>
<H3><A NAME="Heading14"></A><FONT COLOR="#000077">For Further Thought</FONT></H3>
<P>As you&#146;ve seen in this chapter, NT is a favorite target of hackers. Many of the internals for NT are not publicly available for review. At a 1997 DEFCON conference, Microsoft representatives asked a team of NT security experts what could be done to improve the security of NT. Most of the panel members remarked that documenting and publishing information would be a significant step forward.
</P>
<P>Echoing the sentiments of other DEFCON participants, the panel members pointed out that it was difficult to securely configure NT systems for customers because the internal workings remained a mystery. Undocumented registry entries can lead to exposures because the consequences of ACL changes for those entries are not well understood by the public. Hackers, though, always find a way to <I>discover</I> the hidden secrets. In response to this request, Microsoft has sought advice from several independent security companies on the best way to document and make available this information. Hopefully, the knowledge will soon be shared.</P>
<P>One important message delivered over the last year or two is that a system evaluated at C2 level is not necessarily <I>secure</I>. True, Microsoft NT received its C2 evaluation with a nonnetwork attached system, but some of the attacks that have been announced against NT did not require remote access. Many weaknesses could be exploited by a user who might rely on a shared NT computer in the corner of a lab. A stamp of approval is only as good as the humans who build the system and those carrying out the evaluation. People make mistakes, and improperly protected registry entries in out-of-the-box configurations of NT show that even government-evaluated systems can still have flaws.</P>
<P>The popularity of NT is growing along with its install base. The market for NT IDSs is strong and also should grow during the next several years. One could predict that the marketplace for NT IDSs will be more competitive because the NT event log is easier to access and understand than UNIX audit logs. However, any of the IDS vendors currently working in the NT space will quickly point out that many mysteries lurk in the event log. Changes between service packs have caused more than one IDS vendor to rewrite code because events were no longer reported or the format of an event had changed.</P>
<P>Because Microsoft is planning major changes to NT security in its next major release (Microsoft 1997), you can expect the market to churn some more. Early access to NT V5.0 is a must for IDS vendors. Changes including support for Kerberos, moving registry entries into a directory service, and X.509 will push vendors to adjust their tools to incorporate and monitor new features.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="296-298.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="../ch11/303-307.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久久影院官网| 91国偷自产一区二区三区成为亚洲经典| 7777女厕盗摄久久久| 一区二区三区在线视频播放| 国产精品一区免费视频| 久久一区二区视频| 国产一区二区不卡老阿姨| 26uuu精品一区二区| 精品一区二区三区不卡 | 91精品国产综合久久福利| 婷婷开心久久网| 91麻豆精品国产91| 日本不卡高清视频| 精品日本一线二线三线不卡| 久久精品国产精品亚洲综合| 日韩欧美国产精品一区| 紧缚捆绑精品一区二区| 国产日韩欧美激情| 91最新地址在线播放| 亚洲综合色噜噜狠狠| 欧美在线免费视屏| 日韩中文字幕一区二区三区| 精品黑人一区二区三区久久| 粉嫩av一区二区三区在线播放| 国产精品久久久久四虎| 欧美性xxxxx极品少妇| 日韩电影在线免费看| 久久久亚洲高清| 色婷婷av一区二区三区gif | 亚洲成人动漫在线免费观看| 欧美不卡视频一区| 91免费国产视频网站| 久久精品国产一区二区三区免费看 | 日本不卡视频一二三区| 国产精品素人一区二区| 欧美日韩在线不卡| 国产成人午夜视频| 亚洲成人av免费| 亚洲丝袜美腿综合| 精品区一区二区| 欧美优质美女网站| 99久久精品费精品国产一区二区| 丝袜亚洲另类丝袜在线| 中文字幕亚洲一区二区va在线| 欧美xxxxx裸体时装秀| 欧美三级在线视频| 99精品国产热久久91蜜凸| 国精品**一区二区三区在线蜜桃| 视频一区二区欧美| 一区二区三区中文字幕| 国产免费观看久久| 久久视频一区二区| 五月天丁香久久| 一区二区三区四区激情| 综合欧美一区二区三区| 国产日韩av一区| 欧美国产激情二区三区| 国产午夜精品美女毛片视频| 久久综合久久综合久久| 久久色成人在线| 久久你懂得1024| 久久免费国产精品| 国产亲近乱来精品视频| 国产蜜臀97一区二区三区| 久久精品日韩一区二区三区| 国产视频视频一区| 1024亚洲合集| 亚洲 欧美综合在线网络| 日韩福利视频网| 久久99精品国产| 国产盗摄精品一区二区三区在线| 成人一级片在线观看| 93久久精品日日躁夜夜躁欧美| 一本色道久久综合精品竹菊| 精品1区2区3区| 26uuu亚洲综合色| 国产精品成人网| 日韩精品色哟哟| 国产成人综合自拍| 91一区二区三区在线播放| 欧美人与性动xxxx| 久久精品一区二区| 一区二区三区中文字幕精品精品| 免费人成黄页网站在线一区二区| 国产九色sp调教91| 欧美色电影在线| 免费成人在线影院| 成人久久视频在线观看| 91 com成人网| 亚洲欧洲在线观看av| 日本麻豆一区二区三区视频| 不卡一区二区在线| 欧美一级视频精品观看| 中文字幕欧美激情一区| 视频一区中文字幕| www.色精品| 国产日韩一级二级三级| 青青国产91久久久久久| 在线一区二区观看| |精品福利一区二区三区| 国产自产视频一区二区三区| 在线播放国产精品二区一二区四区| 国产亚洲福利社区一区| 日本不卡高清视频| 欧美午夜寂寞影院| 亚洲欧美另类小说| 国产福利一区在线观看| 日韩精品一区二区三区在线 | 国产日韩视频一区二区三区| 麻豆精品一区二区综合av| 91福利视频网站| 国产精品青草综合久久久久99| 久久99国产精品久久99果冻传媒| 欧美中文字幕一区二区三区 | 国产麻豆9l精品三级站| 91精品国产一区二区三区蜜臀 | 欧美综合久久久| 亚洲精品一二三| 91视频在线观看| 亚洲黄一区二区三区| av高清久久久| 一级日本不卡的影视| 欧美视频一区二区在线观看| 伊人开心综合网| 欧美日韩一区二区三区高清| 一区二区三区日韩精品视频| 欧洲精品在线观看| 亚洲福利视频一区| 91精品福利在线一区二区三区| 石原莉奈在线亚洲三区| 日韩一区二区在线看| 国产一区在线不卡| 中文字幕乱码日本亚洲一区二区| 成人av资源网站| 亚洲精品一二三| 91麻豆精品国产自产在线观看一区 | 午夜激情久久久| 亚洲精品在线网站| 成人av网在线| 一区二区国产盗摄色噜噜| 91精品国产福利| 不卡一区二区三区四区| 亚洲精品美国一| 欧美一区二区三区日韩视频| 粉嫩av亚洲一区二区图片| 依依成人综合视频| 久久综合丝袜日本网| 91在线免费视频观看| 午夜精品福利一区二区蜜股av| 欧美成人女星排行榜| 99精品久久久久久| 免费成人深夜小野草| 综合欧美亚洲日本| 欧美va在线播放| 欧美日韩一区二区三区视频| 国产激情一区二区三区| 亚洲成人一区在线| 日韩一区在线免费观看| 欧美哺乳videos| 欧美视频自拍偷拍| av电影在线不卡| 成人晚上爱看视频| 国产一二精品视频| 男男成人高潮片免费网站| 怡红院av一区二区三区| 国产精品久久久久影院老司| 日韩一区二区电影| 在线电影一区二区三区| 97久久超碰精品国产| 国产福利精品一区二区| 另类人妖一区二区av| 亚洲综合成人在线视频| 亚洲男人电影天堂| 国产精品美女久久久久久2018| 久久影院午夜片一区| 精品成人私密视频| 日韩午夜小视频| 日韩欧美国产一区在线观看| 欧美高清视频不卡网| 欧美日韩一卡二卡三卡| 欧美高清视频在线高清观看mv色露露十八 | 成人美女视频在线看| a亚洲天堂av| 91在线一区二区| 色av一区二区| 欧美精品亚洲二区| 日韩视频永久免费| 久久伊人蜜桃av一区二区| 久久午夜色播影院免费高清| 久久久久久久久蜜桃| 国产精品网站导航| 亚洲一区在线观看视频| 午夜精品福利视频网站| 理论电影国产精品| av一区二区久久| 欧美日韩中文字幕一区| 日韩女优av电影| 中文字幕精品综合| 亚洲国产精品人人做人人爽| 免费人成精品欧美精品|