亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 265-268.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=9//-->
<!--PAGES=265-268//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="263-265.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="268-270.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H4 ALIGN="LEFT"><A NAME="Heading5"></A><FONT COLOR="#000077">Other Network IDS Features</FONT></H4>
<P>Like any other application that you run in a distributed environment, a network IDS needs to provide useful systems management capabilities. Features needed include the following:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Configuration of multiple network IDSs from a central console
<DD><B>&#149;</B>&nbsp;&nbsp;Centralized reporting from network IDSs to a central console
<DD><B>&#149;</B>&nbsp;&nbsp;Secure communications between distributed components
<DD><B>&#149;</B>&nbsp;&nbsp;Configurable sets of attack signatures to monitor
<DD><B>&#149;</B>&nbsp;&nbsp;Easy-to-read reports
<DD><B>&#149;</B>&nbsp;&nbsp;Real-time alerts and optional responses
<DD><B>&#149;</B>&nbsp;&nbsp;Integration with system management frameworks, such as Tivoli TME
</DL>
<P>Depending on your level of sophistication, you might also be interested in designing your own attack signatures. Not all network IDSs provide a simple way for you to create signatures.
</P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">Network IDS Attack Recognition</FONT></H3>
<P>What can a network IDS detect? First, because the source of information is network packets, network IDSs look for <I>attacks that are targeted at network protocols</I>. Examples include Ping of Death and SYN Flood because both of these are attacks against weaknesses in TCP/IP itself. Problems in other protocols, such as Novell IPX and Microsoft SMB, also are found.</P>
<P>Protocol problems result in other attacks such as the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Sequence number guessing attempts
<DD><B>&#149;</B>&nbsp;&nbsp;IP address impersonation
<DD><B>&#149;</B>&nbsp;&nbsp;Session hijacking
<DD><B>&#149;</B>&nbsp;&nbsp;IP fragmentation
<DD><B>&#149;</B>&nbsp;&nbsp;Other well-known denial-of-service attacks (the &#147;Pizza&#148; attack mentioned earlier in the book)
</DL>
<P>Next, by analyzing packet data content (as opposed to header fields) a network IDS can look for attacks such as the AIX &#147;rlogin -froot&#148; bug. Other example <I>application attacks and vulnerabilities</I> detected by network IDSs are as follow:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Various sendmail bugs (EXPN, VRFY, debug)
<DD><B>&#149;</B>&nbsp;&nbsp;phf, test.cgi, and other CGI bugs
<DD><B>&#149;</B>&nbsp;&nbsp;Buffer overflows in finger and DNS
<DD><B>&#149;</B>&nbsp;&nbsp;Various NFS, FTP, and TFTP bugs
</DL>
<P>Unlike scanners that occasionally probe your systems for these weaknesses, network IDSs look for evidence of someone mounting one of these attacks against your systems in real time. The evidence is found by inspecting the contents of packets.
</P>
<P>Finally, scanning packet data for unauthorized strings such as &#147;confidential&#148;, &#147;proprietary&#148;, &#147;secret&#148;, and other <I>potential leakages</I> is another feature found in some network IDSs. A list of keywords can be configured into the IDS. Naturally, performance concerns arise if the list is too long.</P>
<P>Chapter 7, &#147;Vulnerability Scanners,&#148; described useful scanner tools that can be used to probe your systems for weaknesses. If a hacker is scanning your system with ISS or SATAN, a network IDS should be able to detect the activity. Of course, looking for patterns such as port scanning of TCP/IP ports is a process that also is affected by time. What if an attacker scans one port per day? Is this something that a network IDS can detect? Most network IDSs have a time-out setting that you can configure to determine the interval, which constitutes a group of related events such as sequential port scans. If you set this value too small, you could miss sequential port scans across days, for example.</P>
<H4 ALIGN="LEFT"><A NAME="Heading7"></A><FONT COLOR="#000077">Fragmented IP Packets</FONT></H4>
<P>Breaking down packets into smaller chunks and reassembling them into the proper format is something that happens often in network communications. You saw how this happens between network layers on the same system, and between peer layers on different systems when you read Chapter 4, &#147;Traditional Network Security Approaches.&#148;
</P>
<P>A well-known attack called IP Fragmentation tries to inject or form bogus IP packets so that when they are reassembled at the target node, there is a chance for a successful hack. Various operating systems handle reassembly of fragmented packets differently. So, the attack will not always succeed.</P>
<P>Recall that sequence numbers are included in TCP/IP packets so that the receiving node can reassemble packets received out of order into the proper format. By messing around with sequence numbers in injected or forged packets, an attacker can trick the receiving system into overlaying already received data with something else. For example, if the target node received a packet with the sequence number for bytes 1&#150;5 and data &#147;smith.&#148; The hacker could send another packet with the same sequence number but data &#147;root.&#148; Depending on how the receiving OS handles this condition, it will either overlay the first packet or discard the new (hacked) packet. The behavior of the OS determines whether the hack succeeds or not.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="263-265.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="268-270.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99久久伊人精品| 午夜精品久久久久久久99樱桃| 亚洲综合另类小说| 国产成人在线视频网站| 欧美日韩另类国产亚洲欧美一级| 国产精品久久久久久妇女6080| 美女网站色91| 欧美私人免费视频| 国产精品久久毛片| 亚洲成人一区在线| 国产欧美中文在线| 久久国内精品视频| 欧美日韩国产一级| ...av二区三区久久精品| 国产一区高清在线| 欧美一区二区三区在线观看 | 99视频一区二区| 久久久久99精品一区| 日韩不卡一区二区| 欧美三级电影网站| 中文字幕在线免费不卡| 亚洲h动漫在线| 91女神在线视频| 亚洲国产精品v| 加勒比av一区二区| 欧美一区二区三区免费| 亚洲va韩国va欧美va| 一本色道a无线码一区v| 最新国产精品久久精品| 国产精品99久久不卡二区| 欧美大片顶级少妇| 精品一区二区三区在线观看| 制服丝袜中文字幕亚洲| 五月婷婷综合激情| 欧洲视频一区二区| 亚洲一区影音先锋| 在线精品视频一区二区三四| 亚洲精品高清在线观看| 色94色欧美sute亚洲线路一ni| 国产精品美女久久久久aⅴ国产馆| 国产麻豆午夜三级精品| 国产日韩欧美制服另类| 高清不卡一区二区在线| 国产区在线观看成人精品| 大美女一区二区三区| 欧美激情资源网| 不卡一区在线观看| 亚洲欧美中日韩| 色综合亚洲欧洲| 亚洲狠狠爱一区二区三区| 精品午夜一区二区三区在线观看| 欧美在线视频全部完| 午夜久久久久久久久| 8x福利精品第一导航| 首页亚洲欧美制服丝腿| 欧美一卡2卡三卡4卡5免费| 人禽交欧美网站| 日韩一级免费观看| 久久99国产精品久久99| 久久久久久麻豆| 成+人+亚洲+综合天堂| 一区二区三区美女视频| 欧美综合一区二区| 午夜久久福利影院| 亚洲精品一区二区三区精华液| 成人在线综合网站| 一区二区三区在线观看动漫| 欧美日本高清视频在线观看| 久久精品国产一区二区三区免费看| 久久久亚洲欧洲日产国码αv| 成人av一区二区三区| 亚洲大片免费看| 日韩精品在线网站| hitomi一区二区三区精品| 亚洲一区二区三区在线播放| 91精品免费在线观看| 国产精品亚洲午夜一区二区三区 | 欧美日韩在线综合| 人人超碰91尤物精品国产| 久久久久久久久久美女| 一本一道波多野结衣一区二区| 日韩不卡一区二区三区 | 欧美日韩国产另类一区| 久久国产精品色| 国产精品国产自产拍在线| 欧美日韩另类一区| 国产精品一区三区| 一区二区久久久| 精品国产成人系列| 日本高清免费不卡视频| 国产中文字幕精品| 亚洲一区二区在线免费观看视频| 欧美成人精品二区三区99精品| 一区二区三区av电影| 日韩午夜精品电影| 99国产精品一区| 六月丁香婷婷色狠狠久久| 亚洲欧洲国产日本综合| 日韩欧美电影在线| 色婷婷亚洲综合| 久久66热re国产| 亚洲精品水蜜桃| 久久噜噜亚洲综合| 欧美老女人在线| 成人av在线网站| 久久精品噜噜噜成人88aⅴ| 亚洲蜜桃精久久久久久久| 精品国产欧美一区二区| 欧美视频在线观看一区二区| 国产精品一区二区你懂的| 亚洲v精品v日韩v欧美v专区| 国产精品天天看| 欧美大片日本大片免费观看| 欧洲生活片亚洲生活在线观看| 国产91在线|亚洲| 日韩二区三区四区| 亚洲视频一区二区在线| 国产亚洲一二三区| 91麻豆精品国产综合久久久久久| 91在线精品一区二区| 国产激情一区二区三区四区| 男女性色大片免费观看一区二区| 一区二区成人在线视频| 国产欧美精品国产国产专区| 日韩免费在线观看| 欧美最新大片在线看| 99久久综合狠狠综合久久| 国产精品一品视频| 精品一区二区精品| 日本伊人色综合网| 亚洲电影一级黄| 日韩理论片一区二区| 国产欧美精品日韩区二区麻豆天美| 日韩三级视频在线观看| 欧美日韩不卡视频| 日本道色综合久久| 色综合久久久久综合体| 99精品在线免费| 成人免费视频视频在线观看免费 | 一区二区三区成人| 亚洲色图清纯唯美| 精品国产乱码久久久久久图片 | 国产精品996| 国产一区二区在线看| 久久电影网站中文字幕| 日本不卡视频在线| 日韩精品欧美精品| 日韩电影在线观看电影| 日韩电影在线观看电影| 天堂一区二区在线| 奇米亚洲午夜久久精品| 秋霞午夜鲁丝一区二区老狼| 日本最新不卡在线| 免费成人小视频| 久久国产人妖系列| 国内外成人在线| 国内精品写真在线观看| 国产在线不卡视频| 国产成a人无v码亚洲福利| 国产91丝袜在线播放0| 国产成人免费网站| 成人一区二区视频| 99精品欧美一区二区三区小说| 91亚洲男人天堂| 日本韩国精品在线| 欧美色区777第一页| 欧美日韩精品一区二区| 欧美电影影音先锋| 欧美一级免费大片| 日韩欧美亚洲国产精品字幕久久久| 91精品国产一区二区三区| 欧美男男青年gay1069videost| 91精品婷婷国产综合久久性色| 日韩欧美三级在线| 久久久久久免费毛片精品| 国产精品午夜免费| 亚洲免费观看高清完整版在线观看 | 蜜臀精品一区二区三区在线观看| 久久成人av少妇免费| 国产黑丝在线一区二区三区| 国产69精品久久99不卡| 91浏览器在线视频| 欧美日韩成人综合| 在线播放中文字幕一区| 色久优优欧美色久优优| 欧美精品久久久久久久多人混战 | 日韩美女在线视频 | 日韩精品一区二区三区在线观看| 久久久久97国产精华液好用吗| 国产精品不卡在线| 亚洲一二三四区不卡| 免费人成网站在线观看欧美高清| 国产伦精品一区二区三区免费 | 国产精品99久久久久久宅男| 99天天综合性| 欧美福利视频一区| 久久精品亚洲国产奇米99| 依依成人精品视频| 麻豆精品精品国产自在97香蕉| 成人网页在线观看|