亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 240-243.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.intranetandextranetdevelopment1.html">Intranet Dev
			<option value="/reference/dir.middleware.html">Middleware
			<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
			<option value="/reference/dir.networkservices1.html">Networks 
			<option value="/reference/dir.operatingsystems.html">OS
			<option value="/reference/dir.productivityapplications1.html">Prod Apps
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=8//-->
<!--PAGES=240-243//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="237-240.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="243-245.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H4 ALIGN="LEFT"><A NAME="Heading12"></A><FONT COLOR="#000077">Ease of Set Up</FONT></H4>
<P>Both Stalker and CMDS are distributed, client-server products. Depending on your network configuration, the installation and setup can be simple or complex. The usual rule of &#147;your mileage may vary&#148; is a good one to keep in mind. Agent code must be installed on each CMDS target or Stalker agent. Although some autodiscovery is provided, the Server or Manager will need to be made aware of which nodes to monitor. The time it takes to configure nodes is a small constant value in most cases, but you need to multiply this value by the number of nodes you have.
</P>
<P>As with most systems that rely on host names and IP addresses for identification, the use of <I>dynamic host configuration protocol</I> (DHCP) or regular changes to host identifiers will require additional administration. If you treat all monitored nodes uniformly, administration is simpler. However, if you want to analyze different statistics or attack patterns on each node, your administrative workload also will increase. Any variability in your monitoring requirements per node naturally will drive configuration changes on either agents or servers/managers.</P>
<H4 ALIGN="LEFT"><A NAME="Heading13"></A><FONT COLOR="#000077">Distributed Intrusion Detection</FONT></H4>
<P>Neither Stalker nor CMDS track the activities of a given user across multiple systems unless the assumption is that a person will have the same UID across all systems in the enterprise. Because this assumption is highly unlikely&#151;even though the login name might be the same, the UIDs across systems may not be equivalent&#151;tracking the activities of a single user throughout the enterprise is not straightforward.
</P>
<P>One solution would be to add to each audit record, when consolidated on the server, with the originating host IP address. Unfortunately, this solution does not work for systems with multiple network adapters because the node will have several IP addresses. Also, in sites where IP addresses are assigned dynamically with DHCP, relying on an IP address to be meaningful would be a mistake because it could be reassigned at a future time. The host&#146;s name would probably be more reliable. When consolidating activities across systems, CMDS relies on the host&#146;s name and UID paired together to uniquely identify a user.</P>
<P>Distributed systems management framework vendors, such as Tivoli, are all too aware of this identity problem in networked environments. The favored approach is to assign a framework-specific host identifier that is persistent across changes in IP addresses or other system parameters, such as the planar ROM ID. Assigning a network user name that is independent of the system on which a user operates also would be useful. However, such an extension would require changes in core parts of the OS, such as the login process and the generation of audit records, in order to track user activities across multiple systems. One research project prototyped this approach for intrusion detection across systems (Snapp et al., 1991).</P>
<H4 ALIGN="LEFT"><A NAME="Heading14"></A><FONT COLOR="#000077">Monitoring and Privacy</FONT></H4>
<P>Keystroke monitoring has not been a fruitful approach to intrusion detection. As with many other computer science endeavors, context-sensitive analysis of data is one of the most difficult reasoning challenges for a program. Therefore, no commercial IDSs rely on keystrokes for determining misuses or intrusions. If such a tool were to exist, how would you handle privacy issues?
</P>
<P>Most companies own the intellectual property of employees and also legally restrict computer activities to only those approved by management. A common practice is to present this warning to all computers users as part of the normal login message. This does not mean that <I>all</I> managers in a company own <I>all</I> of the correspondence of <I>all</I> of the employees. Especially unclear is how to handle the conflict that arises between privacy and monitoring. For example, if your IDS <I>does</I> monitor keystrokes, then someone is capable of reading the e-mail of employees. Sure, the company owns the content of these messages anyway. But, what if the message is from an employee to a superior complaining about harassment on the job. Is this something from which an IDS might generate alerts or message excerpts?</P>
<P>Unfortunately, you should be worried about privacy and IDSs even though they do not perform keystroke analysis. What if someone is filling out a medical form online and enters words such as &#147;attack,&#148; &#147;weakness,&#148; and &#147;confidential?&#148; Many network sniffers would look for these as part of a standard set of watch words. Ideally, you could configure the sniffer to ignore these words when the user was in the <I>context</I> of a medical application online, but it&#146;s unlikely the tool supports this because it is a difficult algorithm to generalize.</P>
<P>System monitoring tools also require caution. Audit trail reports contain the full command and its parameters in most cases. Knowing that an employee is suddenly sending several mail messages to someone in personnel could be confidential. This situation particularly becomes a problem if the manager is receiving IDS usage reports (to look for misuse problems), and the employee is documenting improper behavior by that manager. In this particular case, the best advice is to document the problem on a home computer rather than risk discovery by unauthorized sniffers being used at your site.</P>
<P>By the way, these privacy problems are not limited to intrusion detection. In plenty of cases, developers use network sniffers to capture packets that are needed to debug a problem. Separating confidential information from test environments is the right approach for solving this dilemma. An interesting legend has gone around about how some user IDs and passwords from a reputable company found their way into one distribution of Crack when the software was tested in a production environment.</P>
<P>If you run a scanner and configure it to mail reports, verify your configuration so that you are not mailing the list of easily guessed passwords to everyone at your site, or even worse to your favorite newsgroup on the Internet. In some instances, someone mailed the output of a scan to a personal account <I>outside</I> the company, and the mail message flowed in the clear across the Internet. Remember, without encryption the Internet is like one big party line that many people share.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="237-240.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="243-245.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91年精品国产| 国产ts人妖一区二区| 欧美伊人精品成人久久综合97| 26uuu亚洲婷婷狠狠天堂| 免费观看日韩av| 337p粉嫩大胆色噜噜噜噜亚洲| 久久99精品久久久久久国产越南 | 国产亚洲va综合人人澡精品| 久久精品国内一区二区三区| 久久综合久久99| 福利视频网站一区二区三区| 亚洲四区在线观看| 欧美人妇做爰xxxⅹ性高电影| 免费精品视频在线| 国产欧美日韩卡一| 在线免费精品视频| 免费成人你懂的| 国产精品美女一区二区在线观看| 色悠悠亚洲一区二区| 日韩福利电影在线观看| 国产情人综合久久777777| 色综合天天性综合| 天堂一区二区在线免费观看| 久久久五月婷婷| 99久久99久久精品免费观看| 亚洲高清一区二区三区| 久久综合九色综合欧美98| 9人人澡人人爽人人精品| 亚洲午夜在线视频| 国产亚洲精久久久久久| 91成人免费电影| 久久99久久精品欧美| 中文字幕日韩精品一区| 制服丝袜中文字幕亚洲| 成人av电影在线网| 免费看精品久久片| 亚洲黄色小视频| 久久亚洲精华国产精华液 | 伊人婷婷欧美激情| 欧美一级片在线看| 91在线视频18| 久久精品国产77777蜜臀| 亚洲男人天堂av| 欧美变态口味重另类| 色偷偷88欧美精品久久久| 精品一区二区三区免费视频| 一二三四区精品视频| 国产午夜一区二区三区| 制服丝袜国产精品| 色婷婷香蕉在线一区二区| 国产91精品一区二区麻豆亚洲| 亚洲国产色一区| 亚洲视频每日更新| 国产人妖乱国产精品人妖| 欧美一区二区三区视频| 日本电影亚洲天堂一区| 国产不卡在线播放| 狠狠网亚洲精品| 爽好多水快深点欧美视频| 一区二区三区波多野结衣在线观看| 久久亚洲综合色一区二区三区| 正在播放一区二区| 欧美日韩一级片在线观看| 91麻豆国产香蕉久久精品| 高清国产一区二区| 国产中文一区二区三区| 国产精品一区二区在线观看不卡| 午夜欧美在线一二页| 一区二区激情小说| 亚洲男人电影天堂| 制服丝袜一区二区三区| 在线播放中文字幕一区| 欧美日本一区二区在线观看| 在线免费观看日韩欧美| 色综合久久天天| 色综合天天综合给合国产| av成人动漫在线观看| 成人网男人的天堂| 成人免费高清视频在线观看| 粉嫩一区二区三区性色av| 国产成人精品www牛牛影视| 国产精品一区免费在线观看| 国产一区二区三区| 国产精品一区二区黑丝| 国产美女视频一区| 国产·精品毛片| 懂色av中文一区二区三区| 成人综合在线观看| caoporn国产精品| 在线看一区二区| 在线播放视频一区| 欧美电视剧在线看免费| 久久免费国产精品| 一区在线观看视频| 亚洲一线二线三线视频| 肉肉av福利一精品导航| 久久99精品久久久久久| 国产福利一区二区三区视频| 99久久国产综合精品色伊| 欧美最猛黑人xxxxx猛交| 91精品欧美综合在线观看最新| 日韩免费福利电影在线观看| 久久久久综合网| 亚洲精品国产一区二区精华液| 天天免费综合色| 激情综合网av| 99久久国产综合精品麻豆| 欧美日本一区二区| 久久久精品欧美丰满| 亚洲欧美在线aaa| 日韩精品1区2区3区| 国产精品综合av一区二区国产馆| av一本久道久久综合久久鬼色| 欧美性极品少妇| 精品99999| 亚洲乱码中文字幕| 狠狠色综合播放一区二区| 色综合网站在线| 精品久久久久一区| 一区av在线播放| 国产精品一级黄| 欧美吞精做爰啪啪高潮| 26uuu色噜噜精品一区二区| 一区二区三区欧美在线观看| 极品少妇xxxx偷拍精品少妇| 在线亚洲人成电影网站色www| 日韩精品一区二区三区视频在线观看| 国产精品三级在线观看| 日本免费新一区视频| 91网页版在线| 久久这里只有精品首页| 亚洲一区av在线| 成人做爰69片免费看网站| 欧美一区三区四区| 亚洲精品视频自拍| 国产成人av一区二区三区在线观看| 成人动漫精品一区二区| 日韩一区二区三区视频在线| 亚洲欧美偷拍三级| 国产乱国产乱300精品| 91精品国模一区二区三区| 最新国产成人在线观看| 国产精品一区二区在线播放| 日韩一区二区三区观看| 亚洲国产精品天堂| 91丨porny丨国产| 国产日产精品1区| 国产一区二区三区在线观看免费视频 | 亚洲综合成人网| av成人老司机| 国产精品麻豆久久久| 国产乱子伦一区二区三区国色天香 | 欧美日韩一区二区在线观看视频| 久久精品一区二区| 精品亚洲免费视频| 日韩视频一区二区在线观看| 视频一区二区三区中文字幕| 色老汉av一区二区三区| 日韩一区欧美小说| 不卡的av电影| 国产精品国产精品国产专区不片| 国产一本一道久久香蕉| 精品国产污污免费网站入口| 日韩精品视频网| 91精品欧美一区二区三区综合在 | 日韩电影一区二区三区| 欧美日韩另类一区| 亚洲第一电影网| 欧美丰满高潮xxxx喷水动漫 | 日本欧美一区二区在线观看| 欧美三级资源在线| 五月激情六月综合| 51精品久久久久久久蜜臀| 免费观看久久久4p| 日韩三级av在线播放| 免费一区二区视频| 26uuu成人网一区二区三区| 国产一区二区三区美女| 日本一区二区三区国色天香| 高清成人免费视频| 1024成人网| 在线观看视频一区二区欧美日韩| 亚洲国产精品久久艾草纯爱| 欧美男生操女生| 理论电影国产精品| 久久久久国产成人精品亚洲午夜| 成人免费毛片高清视频| 亚洲欧洲精品天堂一级| 色8久久精品久久久久久蜜| 日本午夜精品一区二区三区电影| 欧美男同性恋视频网站| 国内久久婷婷综合| 中文字幕一区二区三区在线不卡| 一本一本大道香蕉久在线精品| 亚洲一区二区三区在线看| 欧美一区二区不卡视频| 国产精品一区专区| 亚洲一区二区三区四区五区中文| 在线不卡中文字幕播放| 国产麻豆91精品|