亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 270-273.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
			<option value="/reference/dir.networkservices1.html">Networks 
			<option value="/reference/dir.operatingsystems.html">OS
			<option value="/reference/dir.productivityapplications1.html">Prod Apps
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=9//-->
<!--PAGES=270-273//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="268-270.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="273-276.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H4 ALIGN="LEFT"><A NAME="Heading10"></A><FONT COLOR="#000077">Network Sniffers Do Not See All Packets</FONT></H4>
<P>A network IDS works by running a network adapter in promiscuous mode to capture all of the packets coming into and going out of a particular subnet<I>. Notice that this is not the same as watching all of the network traffic that appears on a subnet</I>. Look at Figure 9.2. Here, the physical arrangement of the nodes is in a ring with node B sitting between node A and the node running the IDS. The packet &#147;Hello B&#148; is sent from node A to node B. However, because A and B are directly adjacent, B grabs and processes the packet sent by A. The node running the IDS never has a chance of seeing the packet.</P>
<P><A NAME="Fig2"></A><A HREF="javascript:displayWindow('images/09-02.jpg',499,472 )"><IMG SRC="images/09-02t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/09-02.jpg',499,472)"><FONT COLOR="#000077"><B>Figure 9.2</B></FONT></A>&nbsp;&nbsp;An IDS does not see all packets on a subnet.</P>
<P>This means that a network IDS is not designed to track all the network activities on a subnet. Instead, the IDS is positioned to look for inbound and outbound packets at the entry/exit of the subnet. Following terminology introduced earlier in the book, the network IDS catches intruders, but it does not always catch internal misuse. If the packet from A to B had been a misuse or internal hack, the IDS node would miss it. To catch attacks between nodes, an intelligent IDS sniffer would need to be run on each node.
</P>
<H4 ALIGN="LEFT"><A NAME="Heading11"></A><FONT COLOR="#000077">Network Sniffers Are Blinded by Encryption</FONT></H4>
<P>Many sites rely on encryption for privacy of network traffic. In some cases, two corporate sites are connected by an IP tunnel. A firewall at each site implements the IP tunnel so that all traffic is encrypted as it passes across the unsecure Internet. After a firewall receives an encrypted packet from another site, the packet is decrypted and sent on to the target node in the secure network. A configuration like this <I>does not</I> hinder network intrusion detection. The packet appears in the clear as it leaves the firewall. Because the network IDS is the first node after the firewall (see Figure 9.1), the encryption does not impact the solution.</P>
<P>In some cases, though, an IP tunnel is established between two <I>arbitrary</I> nodes in a network. The nodes could be in the same subnet, or they could be communicating across the Internet. The IP traffic is not decrypted until the receiving node reads the packet from its network adapter. The network IDS has no way of seeing the cleartext version of the packets. Any attack signatures that require cleartext packets will not work when two nodes use an IP tunnel. Again, one possible solution to this problem is to run a sniffer on each node. Note that the sniffer must be in the OS network stack <I>after</I> the packets are decrypted.</P>
<P>When you connect from a browser to a Web server using <I>secure sockets</I> (SSL), the packets from your computer are not decrypted until they reach the Web server application itself. SSL packets flow through the firewall and remain encrypted. The packet arrives at the Web server node, moves up through the kernel stack, and is read by the Web server program from a socket. It is not until this last step, which only the Web server program itself controls, that the packet is decrypted. This type of application-level encryption also blinds network sniffers to many attacks such as the &#147;phf&#148; hack.</P>
<H4 ALIGN="LEFT"><A NAME="Heading12"></A><FONT COLOR="#000077">Missed System-Level Attacks</FONT></H4>
<P>As mentioned in Chapter 6, &#147;Detecting Intruders on Your System Is Fun and Easy,&#148; system-level monitoring has access to important events such as privilege transition. A <I>new</I> attack that causes a buffer overflow and gives root privileges to a remote user will not be seen by a network IDS. If the attack signature is written properly, the system-level IDS will detect and respond to this type of situation.</P>
<P>Two general classes of attacks exist that a network IDS cannot detect, but a system-level IDS can. You can think of the first class as <I>unknown side effects</I>. When an activity on the system happens as the result of receiving a network packet, it&#146;s possible that a side effect will occur that violates your security policy. Examples include the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Creation of a world-writable file by a privileged program as a result of processing a network packet
<DD><B>&#149;</B>&nbsp;&nbsp;Downgrading the security of an existing resource, such as making /etc/passwd world writable
<DD><B>&#149;</B>&nbsp;&nbsp;Upgrading the privilege of a user, such as changing the UID of a normal user to zero in /etc/passwd
<DD><B>&#149;</B>&nbsp;&nbsp;Creation of a back door, such as any program that can lead the user to a root shell
</DL>
<P>Unless the hacks that led to these breaches already are known in the security community, the network IDS will not see these events, but the system-level IDS will. If you have a scanner, some of these problems will be caught the next time it runs. In some sense this argument seems unfair because it merely states that if the attack is not known in the community, the network IDS vendor cannot build a signature to catch the attack. However, even if the initiation sequence for the attack is unknown, a system-level IDS <I>can detect</I> that a SUID root program was created. What this says to you is that you need both types of IDSs&#151;system and network&#151;to catch all of the attacks you face.</P>
<P>The other class of system-level problems that a network IDS misses <I>are attacks that are not based on sending or receiving network packets</I>. Examples include any hacks launched by directly attached terminals or TTYs. If you are connected to the computer system with a terminal, you can start a nasty brute force password guessing program, and no network sniffer will be able to detect it. Most midrange hardware vendors still sell a significant number of dumb terminals to customers. Naturally, these threats are posed mostly by insiders rather than intruders.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="268-270.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="273-276.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美色男人天堂| 奇米777欧美一区二区| 亚洲精品成人悠悠色影视| 日本不卡1234视频| av一区二区久久| 欧美tk—视频vk| 亚洲另类色综合网站| 国产在线精品视频| 欧美中文字幕不卡| 精品国产乱码久久久久久牛牛 | 国产成人一区二区精品非洲| 成人国产电影网| 欧美精品粉嫩高潮一区二区| 精品国产网站在线观看| 亚洲欧美日韩国产手机在线 | 五月婷婷激情综合网| 国产毛片精品国产一区二区三区| 成人精品免费看| 精品视频一区二区三区免费| 久久精品综合网| 日本三级亚洲精品| 色综合咪咪久久| 欧美国产综合色视频| 国产成人免费视| 欧美国产视频在线| 国产精品亚洲专一区二区三区| 日韩一区二区影院| 麻豆成人久久精品二区三区小说| 欧美久久久一区| 日韩成人一级大片| 欧美一区二区三区白人| 日本欧美加勒比视频| 在线播放国产精品二区一二区四区| 成人性生交大片| 国产精品18久久久久久久久久久久 | 国产精品白丝jk黑袜喷水| 精品国产精品网麻豆系列| 狠狠色综合日日| 国产日韩在线不卡| 亚洲欧美日韩国产综合在线| 伊人色综合久久天天| 欧美一区二区视频在线观看 | 在线观看免费视频综合| 欧美精品自拍偷拍动漫精品| 五月天精品一区二区三区| 亚洲男人天堂一区| 欧美日韩一二三区| 亚洲综合在线视频| 综合色天天鬼久久鬼色| 日韩一区二区免费在线观看| 亚洲综合成人网| 成人美女在线观看| 中文字幕av资源一区| 国内精品嫩模私拍在线| 欧美日韩一本到| 亚洲少妇30p| 99re视频这里只有精品| 国产欧美一区二区精品久导航| 国产精品超碰97尤物18| 大美女一区二区三区| 国产精品久久久久一区| 欧美猛男超大videosgay| 亚洲r级在线视频| 精品理论电影在线| 国产盗摄视频一区二区三区| 亚洲精品亚洲人成人网在线播放| 色婷婷久久99综合精品jk白丝| 婷婷国产v国产偷v亚洲高清| 日韩一级片网站| 波波电影院一区二区三区| 亚洲欧美偷拍卡通变态| 欧美一区二区三区爱爱| 韩国欧美国产1区| 日韩毛片视频在线看| 欧美午夜在线一二页| 国产成人免费在线观看不卡| 亚洲日本在线天堂| 精品粉嫩aⅴ一区二区三区四区| 国产乱人伦偷精品视频免下载| 亚洲女人的天堂| 欧美一区二区精品在线| 91成人在线免费观看| 麻豆一区二区99久久久久| 亚洲色图19p| 日韩女优视频免费观看| 精品婷婷伊人一区三区三| 韩日精品视频一区| 日韩精品免费视频人成| 1024亚洲合集| 久久久亚洲高清| 欧美在线播放高清精品| 成人av中文字幕| 日韩av一区二区三区| 亚洲资源中文字幕| 亚洲国产精品ⅴa在线观看| 精品久久久久久久人人人人传媒| 色综合中文综合网| 中文无字幕一区二区三区| 色综合 综合色| 国产91精品欧美| 日韩激情av在线| 亚洲一区二区三区爽爽爽爽爽 | 亚洲精品久久嫩草网站秘色| 91麻豆精品国产91久久久更新时间| 91免费精品国自产拍在线不卡| 丝瓜av网站精品一区二区| 亚洲综合色婷婷| 国产精品拍天天在线| 国产精品视频免费| 日韩精品在线一区二区| 日韩欧美高清在线| 欧美人伦禁忌dvd放荡欲情| 在线观看免费亚洲| 色婷婷久久久亚洲一区二区三区| 91免费国产在线观看| 成人av网站在线| 一本久久a久久免费精品不卡| 国产又黄又大久久| 国产精品12区| 国产精品一区二区男女羞羞无遮挡| 韩国精品主播一区二区在线观看| 午夜天堂影视香蕉久久| 日本欧美一区二区三区乱码| 亚洲成人精品一区| 日韩av高清在线观看| 首页综合国产亚洲丝袜| 麻豆视频观看网址久久| 青青青伊人色综合久久| 国产在线精品免费av| 激情成人午夜视频| 韩国欧美一区二区| 国产传媒久久文化传媒| 日韩av高清在线观看| 久久精品99国产精品| 九九精品一区二区| 国产成人精品亚洲777人妖| 国产精品一区一区三区| 色综合 综合色| 欧美色爱综合网| 久久亚洲一级片| 欧美激情中文不卡| 亚洲五码中文字幕| 蜜桃精品视频在线观看| 国产成人在线视频免费播放| 久久99热这里只有精品| www.99精品| 蜜桃久久久久久| 国产综合色精品一区二区三区| 韩国毛片一区二区三区| 波多野结衣亚洲| 色88888久久久久久影院按摩| 欧美三区在线视频| 日韩午夜三级在线| 亚洲三级久久久| 日本亚洲一区二区| 91视频国产观看| 91精品福利在线一区二区三区| 中文成人综合网| 亚洲va中文字幕| 91网站在线观看视频| 欧美日韩一区二区电影| 精品久久人人做人人爰| 亚洲一区影音先锋| 国产麻豆成人精品| 制服.丝袜.亚洲.另类.中文| 精品少妇一区二区三区免费观看| 亚洲欧美日韩在线| 精品一区二区在线免费观看| 色菇凉天天综合网| 精品欧美乱码久久久久久| 亚洲午夜三级在线| 国产成人免费高清| 久久综合色一综合色88| 国产精品国产三级国产aⅴ原创 | 精品一区二区在线免费观看| 色一情一乱一乱一91av| 久久午夜电影网| 免费精品视频在线| 色综合久久88色综合天天6 | 青青青爽久久午夜综合久久午夜| 春色校园综合激情亚洲| 欧美一区二区三区免费大片| 亚洲中国最大av网站| 成人一区二区三区在线观看| 日韩欧美一卡二卡| 亚洲图片有声小说| 欧美亚洲一区二区三区四区| 久久久久久影视| 国产一区二区不卡在线| 欧美日韩国产首页| 亚洲成人三级小说| gogo大胆日本视频一区| 久久人人超碰精品| 国产高清一区日本| 精品久久人人做人人爽| 免费亚洲电影在线| 欧美电影一区二区| 奇米综合一区二区三区精品视频| 一本到高清视频免费精品| 一区二区三区在线观看动漫|