亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 231-234.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=8//-->
<!--PAGES=231-234//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="229-231.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="234-237.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H4 ALIGN="LEFT"><A NAME="Heading5"></A><FONT COLOR="#000077">Misuse Detector</FONT></H4>
<P>The patented component of Stalker that is most interesting is the collection of intrusion detection patterns along with the engine that analyzes them. In simplistic terms, audit records are dropped into the engine, which maintains a series of state transition diagrams representing intrusions and misuses. When a particular pattern reaches a terminal state, a misuse or intrusion event is indicated.
</P>
<P>This analysis component of Stalker is called the Misuse Detector (MD) for historical reasons. Technically, it is both a misuse detector and an intrusion detector. Recall from earlier discussions that misuse detection looks for abuses by internal users, and intrusion detection is focused on attacks from outsiders. Today, these terms are often used interchangeably.</P>
<P>Like the TB, the MD can be run interactively or scheduled to operate in batch mode. Stalker detects roughly 80&#151;90 different attacks depending on the version of UNIX running on the client. Not all patterns are supported on each OS. From the MD GUI, you can choose which attack signatures you want to monitor.</P>
<H4 ALIGN="LEFT"><A NAME="Heading6"></A><FONT COLOR="#000077">Attacks Detected by Stalker</FONT></H4>
<P>Stalker conveniently groups patterns into classes, such as Trojan Horse. Space does not permit an exhaustive list and description of attacks detected by Stalker. Table 8.1 summarizes this information.
</P>
<TABLE WIDTH="100%"><CAPTION ALIGN=LEFT><B>Table 8.1</B> Stalker&#146;s Misuse Detector Signatures
<TR>
<TH COLSPAN="2"><HR>
<TR>
<TH WIDTH="30%" ALIGN="LEFT">Attack Signature Category
<TH WIDTH="70%" ALIGN="LEFT">Types of Attacks Detected
<TR>
<TD COLSPAN="2"><HR>
<TR>
<TD VALIGN="TOP">Covering Tracks
<TD>Detects when a user tries to modify audit configurations, delete entries in system log files, or run known rogue programs like <I>zap</I> to cover tracks.
<TR>
<TD VALIGN="TOP">Gaining Privilege
<TD>Detects a number of different ways that user gains privilege on the system.
<TR>
<TD>
<TD>These signatures can be configured to permit or deny specific privilege transitions, such as when the RUID changes to zero.
<TR>
<TD VALIGN="TOP">Known Attack Programs
<TD>Looks for instances of a user running one or more known rogue programs.
<TR>
<TD>
<TD>A preconfigured list is provided but can be modified.
<TR>
<TD VALIGN="TOP">Misuse Outcomes
<TD>Looks for evidence of attacks that have a known outcome, such as password guessing attempts matching the order of names in /etc/passwd (indicating the user file has been stolen). Another example is reading someone else&#146;s data or bypassing ACLs by gaining privilege.
<TR>
<TD>Self Defense
<TD>Watches the Stalker directories for evidence of tampering.
<TR>
<TD VALIGN="TOP">System Access
<TD>Detects when critical systems files have been altered, or attempted to be altered. This category includes Trojan Horse signatures.
<TR>
<TD>Vulnerabilities
<TD>Looks for evidence of someone trying to exploit a known security advisory.
<TR>
<TD>Masquerading
<TD>A user switches to another user and then attacks the system.
<TR>
<TD VALIGN="TOP">Tagged Events
<TD>Tagged files or programs that a user accesses (planted by the administrator as bait) or a tagged user account being accessed.
<TR>
<TD COLSPAN="2"><HR>
</TABLE>
<P>The MD was developed over several years and has a good foundation in intrusion detection research. IDSs use different engines for analyzing attacks. Some, such as CMDS, rely on rule-based expert systems. Stalker employs a <I>finite state machine</I> (FSM) for recognizing attacks. As you probably know, finite state machines are the underlying technology for compilers. Recognizing patterns with the utmost speed is one of the reasons FSMs are used in compilers. This reason was also one of the reasons it was chosen for Stalker.</P>
<P>You also can buy a Misuse Detector Toolkit  to add signatures to Stalker. This toolkit is not particularly easy to use and requires skill in C&#43;&#43;. Over time you can expect Stalker and other IDSs to provide a scripting language for writing new patterns.</P>
<H4 ALIGN="LEFT"><A NAME="Heading7"></A><FONT COLOR="#000077">Is Stalker Right for You?</FONT></H4>
<P>At the time this chapter was written, the real-time, client-server, heterogeneous Stalker product was not available. Naturally, you should check the Network Associates Web site for the latest information. Many enhancements to Stalker have been planned and will roll out over time. You want to remember that batch reports are an important part of security monitoring. Monitoring <I>everything</I> in real time is probably not the best approach. Also, Stalker&#146;s capability to go query and search through past audit logs is valuable. If you find that you have been hacked, it&#146;s good to know that you easily can filter for specifics through large amounts of historical audit data using Stalker.</P>
<P>Stalker will be a good match for your environment if you consider the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Real-time analysis is <I>not</I> necessary.
<DD><B>&#149;</B>&nbsp;&nbsp;Identifying the accountable user is <I>very</I> important.
<DD><B>&#149;</B>&nbsp;&nbsp;Audit trails already are captured at your site, or you do not mind logging audit records.
<DD><B>&#149;</B>&nbsp;&nbsp;You need a tool to perform audit reduction.
<DD><B>&#149;</B>&nbsp;&nbsp;You need a tool that detects a wide range of UNIX system attacks.
<DD><B>&#149;</B>&nbsp;&nbsp;Detection of privilege escalation problems is <I>very</I> important at your site.
<DD><B>&#149;</B>&nbsp;&nbsp;You want the capability to scan for custom-defined events in large volumes of data.
<DD><B>&#149;</B>&nbsp;&nbsp;You audit several different UNIX systems.
</DL>
<P>Stalker has a large set of attack patterns for UNIX system-level monitoring. If the set of attack patterns is useful to you, which it probably is, deploying Stalker on critical systems is a good way to get started.
</P>
<P>Unlike accounting files, the audit trail can detect privilege transitions. The Morris worm, which overlaid itself with a fork() and then an exec(), would not have been detected in the accounting files, although it does show up in audit logs. When a user runs a similar attack, the AUID remains unchanged, and thus accountability is preserved. The AUID also persists when a user runs the <I>su</I> command, even though the RUID changes. Other transitions in privilege also are surfaced in the audit log. With Stalker&#146;s TB and MD capabilities, you can catch these type of security events on your systems.</P>
<P>Depending on your needs, Stalker may not be the best tool for your environment. For example, if you want real-time consolidation of audit logs from the clients to the Stalker server, the tool does not provide this feature today. Your requirements might cause you to see the following as limitations of Stalker:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Batch analysis of audit logs.
<DD><B>&#149;</B>&nbsp;&nbsp;Only one client at a time can be interactively administered or configured <I>interactively</I>, although initial definitions for clients can be input via a batch file. (You can run several simultaneous reports in batch mode.)
</DL>
<P>Given the number of valuable reports that Stalker can generate for you, these problems are not particularly difficult.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="229-231.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="234-237.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲成av人片在线| 欧美高清在线一区二区| 8v天堂国产在线一区二区| 在线观看视频一区二区欧美日韩| 色av一区二区| 欧美一区二区三区在线观看| 精品久久久久久无| 中文字幕亚洲综合久久菠萝蜜| 亚洲女人的天堂| 午夜精品123| 成人免费黄色大片| 欧美高清视频不卡网| 亚洲国产精品高清| 午夜精品123| 男人的j进女人的j一区| 国产精品一级二级三级| 欧美日韩色综合| 国产精品三级久久久久三级| 日日夜夜精品视频天天综合网| 国产精品一区二区在线播放| 欧美日韩精品欧美日韩精品 | 国产欧美日韩不卡免费| 亚洲不卡一区二区三区| 成人免费毛片app| 日韩精品一区在线| 亚洲成人激情av| 色婷婷久久一区二区三区麻豆| 精品乱人伦小说| 久久国产欧美日韩精品| 欧美日韩成人综合天天影院| 综合色天天鬼久久鬼色| 国产成人亚洲综合色影视| 欧美成人三级电影在线| 日本三级韩国三级欧美三级| 欧美精品视频www在线观看| 亚洲无人区一区| 91精品国产一区二区三区蜜臀| 性久久久久久久| 欧美色偷偷大香| 日韩电影在线免费| 26uuu另类欧美| 大美女一区二区三区| 久久久久久日产精品| 国产福利一区二区三区视频在线| 日韩女优制服丝袜电影| 国产精品99久| 1024亚洲合集| 欧美日韩久久久一区| 久久精品国产99国产| 国产肉丝袜一区二区| 欧美私模裸体表演在线观看| 综合激情网...| 欧美一区二区成人6969| 国产精品一二三在| 日日摸夜夜添夜夜添亚洲女人| 欧美久久久久久久久中文字幕| 国产精品黄色在线观看| 亚洲自拍都市欧美小说| 欧美精品一二三| 国产精品69久久久久水密桃| 国产精品美女久久久久久久网站| 91麻豆国产在线观看| 无码av免费一区二区三区试看 | 久久综合狠狠综合久久综合88| 激情图片小说一区| 亚洲韩国一区二区三区| 欧美videos大乳护士334| 欧美午夜一区二区三区| 国产很黄免费观看久久| 亚洲国产欧美在线| 中文字幕乱码久久午夜不卡| 欧美影视一区在线| 91麻豆精品一区二区三区| 蜜桃视频第一区免费观看| 亚洲色图一区二区三区| 国产视频在线观看一区二区三区| 欧美成人国产一区二区| 欧美午夜理伦三级在线观看| 91尤物视频在线观看| 国产福利一区在线| 成人性视频免费网站| 成人污污视频在线观看| 国产剧情在线观看一区二区| 日本午夜精品视频在线观看| 亚洲一区二区精品3399| 亚洲日本va午夜在线电影| 亚洲欧美色综合| 一区二区三区不卡在线观看| 亚洲综合在线五月| **网站欧美大片在线观看| 久久综合狠狠综合久久激情| 精品国产乱码久久久久久影片| 欧美嫩在线观看| 欧美成人一区二区三区| 国产性天天综合网| 中文字幕av一区二区三区免费看 | 日韩va亚洲va欧美va久久| 亚洲成a人v欧美综合天堂| 亚洲成人tv网| 国产99一区视频免费| k8久久久一区二区三区| av动漫一区二区| 欧美一区二区三区不卡| 久久久影视传媒| 国产精品第五页| 亚洲成人三级小说| 国产一区二区三区黄视频 | 一区二区三区电影在线播| 久久不见久久见中文字幕免费| 久久国产福利国产秒拍| www.成人网.com| 欧美经典三级视频一区二区三区| 亚洲成av人在线观看| 欧美亚洲禁片免费| 国产亚洲综合色| 麻豆成人在线观看| 色婷婷av一区二区三区大白胸| 欧美一区午夜精品| 午夜精品视频一区| 欧美视频一区二区三区四区| 欧美国产激情一区二区三区蜜月| 亚洲综合图片区| 99re这里只有精品6| 精品国产麻豆免费人成网站| 首页国产丝袜综合| 在线这里只有精品| 亚洲精品日产精品乱码不卡| 国产在线精品免费| 精品国产3级a| 蜜桃av一区二区在线观看| 91麻豆精品久久久久蜜臀| 亚洲一区二区三区国产| 欧美日韩色一区| 丝袜a∨在线一区二区三区不卡| 色狠狠色狠狠综合| 玉足女爽爽91| 日韩欧美国产1| 成人免费观看av| 综合欧美一区二区三区| 色噜噜狠狠成人网p站| 亚洲精品视频免费看| 欧美一二三在线| 成人a级免费电影| 日韩电影一区二区三区| 久久日一线二线三线suv| 成人黄色网址在线观看| 亚洲一区在线观看视频| 欧美sm美女调教| 欧美艳星brazzers| 国产精品一区不卡| 一区二区久久久久久| 久久久久久久久久久99999| 日本高清视频一区二区| 久久精品国产精品青草| 日本一区二区综合亚洲| 欧美二区三区91| 日本精品免费观看高清观看| 久久97超碰国产精品超碰| 依依成人精品视频| 2024国产精品| 欧美日韩久久一区| 99精品视频在线播放观看| 奇米四色…亚洲| 亚洲精品成人a在线观看| 亚洲精品一区二区三区在线观看| 不卡的电影网站| 精品无码三级在线观看视频| 亚洲乱码国产乱码精品精的特点| 久久久久久一二三区| 日韩免费高清av| 日韩天堂在线观看| 日韩一区二区三区观看| 欧美性受xxxx黑人xyx| 色呦呦日韩精品| 一本大道久久精品懂色aⅴ| 99久久婷婷国产| 一本色道a无线码一区v| 色屁屁一区二区| 91国产免费观看| 欧美巨大另类极品videosbest | 久久精品亚洲乱码伦伦中文| 日韩一级片在线播放| 精品国内二区三区| 精品精品国产高清一毛片一天堂| 2欧美一区二区三区在线观看视频| 日韩精品一区二区三区中文精品| 欧美电视剧免费全集观看| 久久―日本道色综合久久| 亚洲天堂久久久久久久| 日韩久久久精品| 精品国产一区二区国模嫣然| 91免费看片在线观看| 国产盗摄精品一区二区三区在线| 国产精品原创巨作av| 欧美日韩三级一区二区| 国产三区在线成人av| 日av在线不卡| 91免费视频网| av电影天堂一区二区在线观看| 国产91精品入口|