亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 237-240.html

?? 入侵檢測的相關(guān)教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=8//-->
<!--PAGES=237-240//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="234-237.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="240-243.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B>Statistical Measures</B></FONT></P>
<P>CMDS computes means and confidence intervals for several different usage measures. In simple terms, the system tracks what a user does in real time by counting the occurrences of different events. The <I>categories</I> that CMDS monitors include the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Failed logins
<DD><B>&#149;</B>&nbsp;&nbsp;Failed reads
<DD><B>&#149;</B>&nbsp;&nbsp;Execution or programs and system calls, whether interactive or batch
<DD><B>&#149;</B>&nbsp;&nbsp;Networking audit records such as socket events
<DD><B>&#149;</B>&nbsp;&nbsp;Browsing activities, such as reading files and changing directories
<DD><B>&#149;</B>&nbsp;&nbsp;su attempts
<DD><B>&#149;</B>&nbsp;&nbsp;Access to devices
</DL>
<P>Customers can define new categories by associating specific audit events with a category. When an audit record of that event type is detected, the category count is incremented. Category statistics can be tracked by user or by IP address. This differentiator is important because it enables you to know that a particular user was busy copying files or that one odd system saw a spike in the total number of file deletes.
</P>
<P><FONT SIZE="+1"><B>Reporting Anomalies</B></FONT></P>
<P>CMDS enables you to report statistics by user and node. An example report is shown in Figure 8.1.
</P>
<P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/08-01.jpg',498,595 )"><IMG SRC="images/08-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/08-01.jpg',498,595)"><FONT COLOR="#000077"><B>Figure 8.1</B></FONT></A>&nbsp;&nbsp;Example report from CMDS.</P>
<P>These reports are available in addition to real-time detection and response for threshold exceptions. Notice that both upper and lower boundaries are defined for a category. If a user&#146;s measure remains within the boundaries, all is well. Any time an activity crosses the upper limit or falls below the lower limit an anomaly is reported.
</P>
<P>A user&#146;s statistical <I>profile</I> is composed of a collection of category measures. The profile is computed from the last 90 days of activities. In addition to computing frequency values and means, a total category count is maintained. Thus, you can know whether a user ran 90 percent of the file delete commands for the day. Reported also is the total number of records per category relative to the total number of audit records. You can know whether file deletes accounted for 50 percent of the day&#146;s activities for the system. CMDS tracks both the AUID and the EUID for an activity to assign accountability.</P>
<P>The daily profile for a user or IP address is broken down by hour. These values are presented in the graphical reports that can be printed on-demand or on a batch schedule. In case you are wondering, the thresholds are computed by calculating the mean for a category and then computing confidence intervals that you can define. The confidence intervals define the upper and lower threshold values.</P>
<P>Alerts can be generated from a single threshold violation from a combined measure from different categories. You can configure these options in the GUI provided with CMDS. Statistical measures can be treated independently or combined. The count from one audit category can be combined with another statistic to invent a third category. The number of combined categories is practically unlimited. Monitoring of thresholds in real time can happen sequentially or in parallel. This feature enables you to prioritize what the engine monitors.</P>
<P><FONT SIZE="+1"><B>Pattern-Matching Signatures</B></FONT></P>
<P>CMDS uses the publicly available <I>Common Language Integrated Production System</I> (CLIPS) expert system developed at NASA. CLIPS is a forward-chaining, rule-based expert system. Backward chaining can be implemented in CLIPS, but CMDS uses the forward-chaining model. In forward-chaining systems, the expert systems reason from facts to goals. An oversimplification is to think of this as the process of elimination for goals known in advance. Backward-chaining systems, should you be curious, assume a goal and then try to prove or disprove it as facts arrive for processing. If you want to know more about all of the gory details of commercial expert system building tools, plenty of sources are available (Waterman, 1988; Harmon, 1990).</P>
<P>CMDS detects roughly 20 attack signatures including the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Setting the SUID bit on a file
<DD><B>&#149;</B>&nbsp;&nbsp;Browsing attacks, such as unauthorized reads
<DD><B>&#149;</B>&nbsp;&nbsp;Known weakness exploits, such as the Sun load module buffer overflow attack
<DD><B>&#149;</B>&nbsp;&nbsp;Successful and unsuccessful remote break in events
<DD><B>&#149;</B>&nbsp;&nbsp;Changes to system accounting configuration
<DD><B>&#149;</B>&nbsp;&nbsp;Trojan Horse planting or execution
<DD><B>&#149;</B>&nbsp;&nbsp;Password attacks
<DD><B>&#149;</B>&nbsp;&nbsp;Masquerade attempts
<DD><B>&#149;</B>&nbsp;&nbsp;Tagged user login
<DD><B>&#149;</B>&nbsp;&nbsp;Tagged file lists which can be customized by the CMDS administrator
<DD><B>&#149;</B>&nbsp;&nbsp;System events such as shutdown, halt, or reboot
</DL>
<P>To create a signature you must know how to add new rules to a CLIPS knowledge base.
</P>
<P><FONT SIZE="+1"><B>Role of Statistical Anomaly Detection</B></FONT></P>
<P>Anomaly detectors look for statistical differences in <I>behavior</I>. They assume intrusions are rare and thus will show up as exceptions to <I>normal</I> behavior. An anomaly detector will trigger when an upper or lower threshold is passed by one of the statistics being calculated.</P>
<P>Often, skilled users pose problems for statistical models because they might use a wider range of commands or occasionally rely on a rarely used command (Smaha and Winslow, 1994). Configuring the event monitor so that it does not report false alarms for skilled users can be difficult. Another way to describe this limitation is to say that statistical techniques are most effective when applied to homogeneous data, such as credit card activities, securities trading, or loan processing.</P>
<P>Not all anomalies are intrusions. If you are a programmer or researcher and decide to run a program a number of times although you do not normally do this, the event could trigger an alert if this activity is one of the statistics in your profile. A system that relies on statistical profiles only may not assign accountability correctly. For example, if one statistic is cumulative evidence of running rogue programs from an account, it is also important to know whether the login user is performing these tasks or whether someone has switched to that user ID from another. Remember that CMDS does <I>not</I> have this problem because it tracks both the AUID and the EUID to assign accountability for actions.</P>
<H3><A NAME="Heading11"></A><FONT COLOR="#000077">Other IDS Features to Consider</FONT></H3>
<P>So far you&#146;ve seen that Stalker and CMDS are complementary system-level IDSs that catch a number of attacks which scanners and network sniffers cannot. The next few sections summarize some other important issues to consider about system intrusion detection.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="234-237.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="240-243.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99精品国产99久久久久久白柏| 国产精品久久毛片a| 偷拍日韩校园综合在线| 中文字幕乱码日本亚洲一区二区| 色呦呦日韩精品| 丝袜诱惑亚洲看片| 亚洲另类在线制服丝袜| 日韩免费一区二区| 欧美午夜精品电影| 久久精品国产一区二区三| 国产精品欧美久久久久一区二区| 国产精品一色哟哟哟| 国产亚洲婷婷免费| 欧美日韩视频在线观看一区二区三区| 色丁香久综合在线久综合在线观看| 日韩一区二区视频| 国产欧美精品在线观看| 久久精品欧美一区二区三区不卡 | 亚洲日本在线看| 亚洲欧美激情插 | 97久久精品人人做人人爽| 色激情天天射综合网| 欧美视频在线一区二区三区| 91.麻豆视频| 2020国产成人综合网| 国产精品视频观看| 亚洲国产精品久久久男人的天堂| 日本va欧美va瓶| 高清不卡在线观看| 91成人在线观看喷潮| 日韩一区二区视频在线观看| 国产清纯在线一区二区www| 亚洲色图视频免费播放| 日本aⅴ免费视频一区二区三区 | 欧美在线不卡视频| 欧美一区二区免费视频| 中文字幕 久热精品 视频在线| 亚洲美女淫视频| 久久超碰97人人做人人爱| 91丝袜高跟美女视频| 制服丝袜亚洲网站| 亚洲国产岛国毛片在线| 天天综合色天天综合| 国产经典欧美精品| 欧美日韩日日骚| 国产欧美精品一区二区色综合朱莉 | 777a∨成人精品桃花网| 国产欧美日本一区视频| 天堂成人免费av电影一区| 成人精品视频一区| 884aa四虎影成人精品一区| 国产精品人人做人人爽人人添| 无吗不卡中文字幕| 成人av免费网站| 欧美zozozo| 亚洲一区二区中文在线| 国产精品综合二区| 制服丝袜亚洲播放| 亚洲免费观看高清在线观看| 久久机这里只有精品| 色噜噜狠狠色综合中国 | 美女视频一区在线观看| 91视频国产观看| 国产亚洲女人久久久久毛片| 亚洲国产日韩一级| 一区二区三区精密机械公司| 成人免费视频视频| 欧美久久久久久久久久| 国产精品亲子伦对白| 日本不卡在线视频| 成人av网站免费观看| 精品三级在线看| 丝袜亚洲精品中文字幕一区| av一区二区久久| 久久色成人在线| 亚洲资源中文字幕| 中文字幕一区二区三区不卡| 国产欧美日韩精品a在线观看| 国产欧美日韩一区二区三区在线观看| 激情偷乱视频一区二区三区| 欧美成va人片在线观看| 黑人巨大精品欧美黑白配亚洲| 亚洲精品在线观看网站| 国产精品一级在线| 中文字幕一区免费在线观看| 91丨porny丨国产| 亚洲综合视频在线观看| 欧美精三区欧美精三区 | 91精品在线免费| 精品一区二区三区在线观看| 国产亚洲欧美色| av亚洲精华国产精华| 亚洲影视在线播放| 日韩欧美亚洲一区二区| 国产乱对白刺激视频不卡| 欧美精彩视频一区二区三区| 91麻豆123| 日韩黄色免费电影| 久久久久久97三级| 91麻豆免费看| 日韩精品1区2区3区| 久久综合国产精品| 北条麻妃国产九九精品视频| 一区二区三区久久| 日韩精品一区二区三区四区视频| 国产69精品久久777的优势| 亚洲男人电影天堂| 欧美一卡二卡三卡四卡| 成人一级黄色片| 亚洲电影中文字幕在线观看| 日韩欧美一级二级三级 | 亚洲一区二区在线免费看| 欧美一区二区免费观在线| 国产精品白丝av| 艳妇臀荡乳欲伦亚洲一区| 日韩一卡二卡三卡国产欧美| 国产91精品一区二区麻豆亚洲| 一二三四社区欧美黄| ww亚洲ww在线观看国产| 在线亚洲+欧美+日本专区| 韩国精品一区二区| 亚洲人妖av一区二区| 精品国产一区久久| 欧亚一区二区三区| 国产成人免费视频精品含羞草妖精 | 国产剧情一区二区| 亚洲尤物在线视频观看| 久久五月婷婷丁香社区| 欧美亚日韩国产aⅴ精品中极品| 寂寞少妇一区二区三区| 亚洲永久免费视频| 国产精品美女www爽爽爽| 在线播放亚洲一区| 99免费精品在线观看| 激情久久五月天| 亚洲午夜久久久久久久久电影院| 久久久精品国产免费观看同学| 欧美日韩你懂得| aa级大片欧美| 国产精品一二三在| 日韩黄色免费电影| 亚洲天堂2016| 国产欧美视频一区二区三区| 7777精品伊人久久久大香线蕉经典版下载 | 51精品久久久久久久蜜臀| 99精品视频一区二区三区| 国产米奇在线777精品观看| 日韩av在线免费观看不卡| 亚洲精品免费看| 国产精品狼人久久影院观看方式| 日韩一区二区三区免费观看| 欧美性大战久久| av网站一区二区三区| 国产乱对白刺激视频不卡| 老司机午夜精品99久久| 亚洲成av人片在线观看无码| 亚洲女同ⅹxx女同tv| 国产精品毛片大码女人| 久久久久97国产精华液好用吗| 欧美一级日韩一级| 欧美日韩性生活| 欧美在线短视频| 在线视频中文字幕一区二区| 91麻豆免费在线观看| 97久久精品人人爽人人爽蜜臀| 成人av在线一区二区三区| 国产成人精品一区二区三区网站观看| 国内精品不卡在线| 麻豆久久久久久| 久久国产精品色| 奇米四色…亚洲| 久久精品国产秦先生| 日本视频一区二区三区| 丝袜亚洲另类欧美| 日韩福利电影在线| 免费在线观看一区| 久久精品国产99| 国产精品综合一区二区| 国产精品99久久久久久久vr| 国产成人啪免费观看软件| 国产成人精品免费| 波多野结衣视频一区| 成人午夜av电影| 91.xcao| 日韩一区二区三区观看| 日韩欧美国产一区二区三区| 精品欧美一区二区三区精品久久 | 国内精品在线播放| 国内偷窥港台综合视频在线播放| 国产一区二区三区综合| 国产白丝精品91爽爽久久| 丁香天五香天堂综合| 播五月开心婷婷综合| 色偷偷久久人人79超碰人人澡| 欧美视频在线一区| 日韩欧美中文字幕制服| 久久亚洲精精品中文字幕早川悠里 | 日韩国产精品大片| 日本不卡视频一二三区| 久久99久久精品|