亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 276-279.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=9//-->
<!--PAGES=276-279//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="273-276.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="279-282.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading15"></A><FONT COLOR="#000077">Which Product Has the Best Nose?</FONT></H3>
<P>An <I>Infoworld</I> test reported in the May 4, 1998 issue rated products as follows:</P>
<DL>
<DD><B>1.</B>&nbsp;&nbsp;IBM&#146;s outsourced solution using NetRanger
<DD><B>2.</B>&nbsp;&nbsp;ISS Real Secure
<DD><B>3.</B>&nbsp;&nbsp;Network Flight Recorder (NFR)
<DD><B>4.</B>&nbsp;&nbsp;Abirnet Session Wall
</DL>
<P>The study by the <I>Infoworld</I> team announced a suite of 16 well-known network attacks that they tried against the products. Only NFR caught all of the attacks. The team used the scripting language, with help from Anzen, to build tests that do the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Probed for information, tried to gain access
<DD><B>&#149;</B>&nbsp;&nbsp;Launched denial-of-service attacks
<DD><B>&#149;</B>&nbsp;&nbsp;Attempted to overburden the IDS with a combination of the preceding
</DL>
<P>The chosen IDS were challenged with attacks such as the following:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Ping of Death
<DD><B>&#149;</B>&nbsp;&nbsp;SATAN scanning
<DD><B>&#149;</B>&nbsp;&nbsp;ISS SAFESuite scanning
<DD><B>&#149;</B>&nbsp;&nbsp;Port scanning
<DD><B>&#149;</B>&nbsp;&nbsp;ftp cwd &#8764;root
<DD><B>&#149;</B>&nbsp;&nbsp;phf
<DD><B>&#149;</B>&nbsp;&nbsp;SYN Flood
</DL>
<P>In all, 23 attacks were attempted individually, with two combinations of attacks completing the full suite of 25. (Some of the 16 attacks have more than one variation that is how one arrives at 23 individual attacks.)
</P>
<P>A three-way tie for first place exists between IBM/NetRanger, RealSecure, and NFR. Abirnet fell into last place for three main reasons&#151;it lacks systems management; it does not have specific IDS reports; and it failed to detect 7 out of 25 attacks. The reviewers nonetheless liked many of SessionWall&#146;s features. The next few sections focus on the three IDSs that tied for first place.</P>
<H4 ALIGN="LEFT"><A NAME="Heading16"></A><FONT COLOR="#000077">IBM and NetRanger</FONT></H4>
<P>As noted previously, NetRanger is a passive network monitor that is offered with an NSC router or as a stand-alone product on a UNIX box. Hierarchical secure remote reporting between sensor stations and a console is one of the key features of NetRanger. The WheelGroup also reports that NetRanger is more scalable than any other network IDS. NetRanger also can detect session hijacking&#151;something that other network IDSs do not claim.
</P>
<P>NetRanger not only detects events but also responds to them as well. Shunning IP addresses for an interval of time is one of the operations that NetRanger can send to the NSC router if you are running that combination. As you might expect, a wide range of response options are available including pager notification, e-mail, and pop-up alerts. Logging and reporting are standard features.</P>
<P>NetRanger allows scanning for administrator-defined strings in network packets&#151;a feature that other network IDSs must soon provide. However, it is not a trivial task to add your own attack signatures to those already supported by NetRanger. This shortcoming is shared by many IDSs.</P>
<P>IBM&#146;s Emergence Response Center offers a fee-based service with NetRanger. Instead of staffing your own team of security experts, you can use IBM&#146;s strength in this area. A network operations center is staffed 7 &#215; 24, and a specific expert is assigned to your account. When an event is detected, IBM&#146;s security experts notify you and help you respond to the event. Up-front planning and response policy design also are available. As hackers become more sophisticated, outsourcing your network intrusion detection seems attractive because you may not be able to staff and maintain your own center of competency.</P>
<P>One final note about NetRanger is worth mentioning. Some of the founders and technical leads for the WheelGroup have worked at the Air Force Warfare Information Center and at the NSA. With contacts like that, it&#146;s not surprising that a number of government sites depend on NetRanger for network intrusion detection. You know NetRanger has been tested substantially in the field.</P>
<H4 ALIGN="LEFT"><A NAME="Heading17"></A><FONT COLOR="#000077">RealSecure</FONT></H4>
<P>ISS is already the market leader in scanning tools with SAFESuite. RealSecure is a widely used network IDS that complements ISS&#146;s other offerings. Like NetRanger, RealSecure supports remote sensing stations, called <I>engines</I>, that report to a central console. Naturally, communication between engines and the console are cryptographically protected using a shared pass phrase. Figure 9.3 shows the initial panel for RealSecure.</P>
<P><A NAME="Fig3"></A><A HREF="javascript:displayWindow('images/09-03.jpg',475,121 )"><IMG SRC="images/09-03t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/09-03.jpg',475,121)"><FONT COLOR="#000077"><B>Figure 9.3</B></FONT></A>&nbsp;&nbsp;RealSecure&#146;s initial management panel.</P>
<P>Monitoring and response options can be customized for each engine. Recall from the previous discussions that your site should have one monitoring engine per subnet (possibly more for performance gains). In Figure 9.4, you see some of the attack signatures that can be configured by node in RealSecure. As before, a comprehensive list of attacks detected is best obtained from ISS because the product is updated regularly.
</P>
<P><A NAME="Fig4"></A><A HREF="javascript:displayWindow('images/09-04.jpg',553,377 )"><IMG SRC="images/09-04t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/09-04.jpg',553,377)"><FONT COLOR="#000077"><B>Figure 9.4</B></FONT></A>&nbsp;&nbsp;RealSecure attack signature configuration.</P>
<P>RealSecure also supports a playback mode, which can be used to dig through the network traffic looking for problems. In playback mode, the product does not run attack signature recognition on the playback traffic. This feature probably will be fixed in the near future. Once activated, the console begins receiving data from the remote engines. You can choose from a number of different views on the console including by node or by event severity (high, medium, or low). Data from the engines is logged, and a variety of reports are possible.
</P>
<P>A number of different response options are available, including killing the offending network connection by sending a RST packet. Figure 9.5 gives a snapshot of how one might configure response options in RealSecure. <I>Templates</I> that declare signatures to use and how to respond to events can be applied to different engine nodes. Notifying an administrator is supported as a response along with the more aggressive socket kill option.</P>
<P><A NAME="Fig5"></A><A HREF="javascript:displayWindow('images/09-05.jpg',387,405 )"><IMG SRC="images/09-05t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/09-05.jpg',387,405)"><FONT COLOR="#000077"><B>Figure 9.5</B></FONT></A>&nbsp;&nbsp;RealSecure response configuration.</P>
<P>RealSecure runs on UNIX and NT platforms. The engines and console can run on different OS platforms, too. Regardless of the platform on which the engine is running, it can detect specific attacks against TCP/IP, NT, NETBIOS, and UNIX. For example, even if the engine is running on an NT workstation, it can detect someone trying to exploit the old AIX &#147;rlogin -froot&#148; bug.
</P>
<P>ISS also relies on its X-Force team of security experts to find new attacks and create (or adjust) signatures. Discoveries can come from the X-Force&#146;s own research or from contacts that it has with the underground. ISS is well known for its NT expertise, with Microsoft often working closely with X-Force team members.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="273-276.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="279-282.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
美国三级日本三级久久99| 日欧美一区二区| 视频一区二区三区中文字幕| 一区二区三区美女视频| 日本v片在线高清不卡在线观看| 不卡电影免费在线播放一区| 欧美群妇大交群的观看方式| 亚洲天堂av老司机| 国内精品国产成人国产三级粉色| 欧美视频在线观看一区| 久久精品一区二区三区不卡牛牛| 视频一区在线播放| 91麻豆国产香蕉久久精品| 久久久久久麻豆| 久久精品国产精品亚洲红杏| 欧美体内she精视频| 中文字幕日韩一区| 国产精品亚洲成人| 欧美成人精品二区三区99精品| 亚洲国产精品麻豆| 在线视频一区二区三| 亚洲精品综合在线| 99re热这里只有精品视频| 国产精品美女久久久久高潮| 国产精品亚洲а∨天堂免在线| 久久尤物电影视频在线观看| 人妖欧美一区二区| 欧美一级理论性理论a| 天天做天天摸天天爽国产一区| 欧美精品一区二区在线观看| 麻豆极品一区二区三区| 秋霞成人午夜伦在线观看| 日韩欧美亚洲另类制服综合在线| 亚洲与欧洲av电影| 欧美一区二区在线观看| 欧美aⅴ一区二区三区视频| 日韩国产在线一| 亚洲柠檬福利资源导航| 日韩中文字幕亚洲一区二区va在线 | 波多野结衣亚洲一区| 国产乱子伦一区二区三区国色天香| 五月激情综合色| 性欧美大战久久久久久久久| 久久 天天综合| 日本乱人伦一区| av网站免费线看精品| 91论坛在线播放| 91精品国产aⅴ一区二区| 国产婷婷色一区二区三区在线| 亚洲人成精品久久久久| 国模无码大尺度一区二区三区| 国产成人av自拍| 欧美日韩aaa| 亚洲欧美偷拍另类a∨色屁股| 国产.欧美.日韩| 美女被吸乳得到大胸91| 国产成人精品亚洲777人妖| 制服丝袜日韩国产| 亚洲另类一区二区| 成人99免费视频| 日本一区二区免费在线观看视频 | 日韩在线播放一区二区| www.日韩av| 国产清纯在线一区二区www| 五月婷婷综合在线| 欧美人xxxx| 视频一区二区欧美| 欧美不卡视频一区| 国产精品每日更新| 亚洲在线成人精品| 亚洲成a人片在线不卡一二三区| 成人免费视频在线观看| 麻豆国产精品一区二区三区| 精品欧美乱码久久久久久| 亚洲欧美经典视频| 成人免费黄色在线| 综合激情网...| 欧美一区二区三级| 91社区在线播放| 国产一区亚洲一区| 日韩电影免费在线看| 日韩视频在线你懂得| 在线视频一区二区免费| 国产精品18久久久久久久久 | 国产成人精品免费一区二区| 国产精品乱码久久久久久| 欧美日韩性生活| 成人性视频免费网站| 免播放器亚洲一区| 国产欧美精品一区| 欧美性猛交xxxx乱大交退制版| 亚洲123区在线观看| 国产精品美女一区二区在线观看| 在线亚洲一区观看| 国产伦精一区二区三区| 日韩在线观看一区二区| 亚洲高清视频的网址| 男人的j进女人的j一区| 日本不卡中文字幕| 国产精品久久久久久久久免费丝袜| 色婷婷久久综合| 国产一区二三区好的| 亚洲精品福利视频网站| xfplay精品久久| 欧美高清视频www夜色资源网| 91在线porny国产在线看| 日韩电影在线免费| 亚洲人成在线播放网站岛国| 国产午夜精品一区二区| 欧美亚洲高清一区| 91极品视觉盛宴| 国产剧情一区在线| 久久精品国产在热久久| 亚洲一区二区三区四区在线| 国产精品素人视频| 欧美一区二区三区精品| 日韩一区二区中文字幕| 毛片av中文字幕一区二区| 日本 国产 欧美色综合| 国产老肥熟一区二区三区| 91网站最新网址| 日韩一区二区精品葵司在线 | 国产麻豆一精品一av一免费| 视频精品一区二区| 亚洲一区二区三区四区五区黄| 国产亚洲欧洲997久久综合| 国产欧美1区2区3区| 国产精品久久久久久久岛一牛影视| 精品成人一区二区三区| 国产午夜亚洲精品不卡| 亚洲欧美综合网| 日韩精品一级中文字幕精品视频免费观看 | 日韩高清在线一区| 国产精品亚洲综合一区在线观看| 欧美日韩一级二级三级| 国产精品视频一二| 国产成人高清视频| 久久久99精品免费观看不卡| 久久电影国产免费久久电影| 在线观看日韩电影| 亚洲欧美自拍偷拍色图| 成人免费视频一区| 欧美一区二区三区视频免费| 免费不卡在线视频| 精品视频在线免费看| 亚洲精品一区二区三区香蕉| 成人欧美一区二区三区在线播放| 国产精品1区2区3区| 日韩欧美一级二级三级| 亚洲夂夂婷婷色拍ww47 | 亚洲国产精品成人综合| 午夜精品福利在线| 欧美日韩精品一区视频| 亚洲成年人网站在线观看| 在线观看亚洲精品| 亚洲欧美日韩国产另类专区| 亚洲超碰97人人做人人爱| 欧美日韩国产成人在线91| 日本不卡一区二区三区| 久久久av毛片精品| 99精品久久99久久久久| 中文字幕一区二区在线观看| 欧美精品粉嫩高潮一区二区| 欧美成人午夜电影| 国产精品午夜在线观看| 国产欧美日韩视频一区二区| 裸体在线国模精品偷拍| 精品国产乱码久久久久久久久| 亚洲欧洲日韩在线| 欧美一区二区三区免费观看视频| 亚洲成人资源在线| 日韩精品资源二区在线| 国产精品456露脸| 亚洲欧洲精品天堂一级| 色哟哟一区二区在线观看| 亚洲精品免费在线观看| 欧美美女黄视频| 成人国产精品免费网站| 亚洲激情中文1区| 日韩一级视频免费观看在线| 国产乱国产乱300精品| 亚洲日本在线视频观看| 91麻豆精品国产91久久久使用方法| 日韩国产精品久久久久久亚洲| 欧美成人r级一区二区三区| 99久久亚洲一区二区三区青草 | 激情国产一区二区| 中文字幕亚洲区| 欧美在线一二三四区| 国产高清精品在线| 亚洲综合丁香婷婷六月香| 在线国产电影不卡| 国产成人h网站| 日本大胆欧美人术艺术动态| 久久精品一区二区三区不卡 | 日韩欧美一区在线| 国产91露脸合集magnet| 久草中文综合在线| 日韩高清在线一区| 亚洲猫色日本管|