亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 211-214.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.middleware.html">Middleware
			<option value="/reference/dir.multimediaandgraphicdesign1.html">Multimedia
			<option value="/reference/dir.networkservices1.html">Networks 
			<option value="/reference/dir.operatingsystems.html">OS
			<option value="/reference/dir.productivityapplications1.html">Prod Apps
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=7//-->
<!--PAGES=211-214//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="209-211.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="214-217.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H4 ALIGN="LEFT"><A NAME="Heading4"></A><FONT COLOR="#000077">Local Scanners</FONT></H4>
<P>Local scanners can plow through the contents of files looking for configuration problems. Many real-time network and system IDSs look at individual events, such as the moment that a file is modified, without knowing <I>what</I> <I>changes</I> were made to the file. A system scanner can look into the file to discover configuration errors or unwanted changes made by a hacker. A very useful hybrid approach would combine the best of both real-time IDSs and scanners. When the file change event is detected by the real-time IDS, part of the scanner is invoked as a response to inspect the file&#146;s contents.</P>
<P>Many times in this book, we have mentioned that a difficult administrative task is configuration of owners, groups, and permissions for files and directories. Scanners can help ensure that these aspects of your security policy are properly implemented. For example, even if you add SeOS to your systems, scanning the SeOS configurations and the OS resources you may have not included in SeOS will improve security. As a security officer or administrator, you are paid to be paranoid. Worrying about whether you have initially configured your systems properly or whether your original secure configurations have been changed is part of the ongoing assessment necessary for a secure site.</P>
<P>Because the local scanner is actually a process running on the target node, you can look for problems that cannot be detected by remote scans. For example, in order to run programs and look for buffer overflow attacks, you must be able to create processes on the system. A remote scanner cannot create <I>arbitrary</I> processes on a system unless it is able to crack into the system.</P>
<P>Local scanners also can inspect patch levels to ensure that you have the latest security fixes installed. As in looking for buffer overflow attacks, this process requires the capability to query the system&#146;s software product inventory. A remote scan is unable to do this unless some type of systems management application is running to provide this information in a client-server manner.</P>
<P>Network configuration errors for a node also can be inspected locally by looking at files such as /etc/services, /etc/inetd.conf, and /etc/rc.tcpip. A remote scanner is unable to peer into individual files (again, unless it is able to crack the system).</P>
<H4 ALIGN="LEFT"><A NAME="Heading5"></A><FONT COLOR="#000077">Remote Scanning</FONT></H4>
<P>Remote scanners examine the network and distributed computing vulnerabilities in your system. If your system allows anonymous FTP users to write into the public download directory, hackers can use your site as a distribution center for stolen software. Network services that give away information or allow a hacker to gain access into your system should not be running. The remote scanner will look for these scenarios.
</P>
<P>Local scanners look for buffer overflow attacks in programs by running them. Remote scanners look for buffer overflow attacks in network services by sending them bogus packets. To make something happen on a local system, you either run a program or send a program a command. The corollary in network computing is to send a packet to a listening process or software server. Remote scanners primarily probe your system by sending network packets.</P>
<P>Sometimes a remote probe sends random packets to look for any exposure in the system. More intelligent poking also occurs when scanners look for trust relationships to exploit. A root .rhosts file, which is spoofable by IP address impersonation, is one trust weakness that a remote scanner tries.</P>
<P>Many of the exposures a system will exhibit are independent of how the system is being used, such as running network services that you should not. A remote scanner also looks for specific weaknesses in your firewall configuration, your Web server configuration, and possibly application configurations. Intrusion detection products are continually moving higher up the OS stack, and application-specific scans already are creeping into products such as ISS SAFESuite. A local scanner will peek into the contents of a Web server and firewall configuration files to uncover mistakes.</P>
<P>A scan run locally on a node will look to see whether there is a root /.rhosts file and report this finding in its results. The /.rhosts file can be used to exploit a system from a remote node, so it is really a network security vulnerability opened by the local system configuration. A remote scanning engine will look for this same problem by attempting to gain system access via programs that rely on /.rhosts for authentication. Both types of scans are discovering (a) a configuration problem in the target system and (2) a network security vulnerability.</P>
<P>As you can see from the discussion so far, combining local and remote scans is necessary in your environment because they complement each other. Sometimes, they detect the same problem in different ways, but this is also useful because it implements security in layers.</P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">How a Scanner Works</FONT></H3>
<P>A scanner probes for weaknesses in your system or network by comparing its database of known vulnerabilities against data about your configurations. Most scanners enable you to configure <I>what</I> you want to scan and <I>when</I> you want to scan for it. Extensibility is another important feature to look for in a scanner. You want to be able to add your own scanning routines to look for site-specific application weaknesses that concern you.</P>
<P>Under the general category of systems management, your scanner should provide for optional centralized reporting. If you have two or three systems, running a local scan on each node and reading the reports on each node may be tolerable. Sites with dozens of systems or more want consolidated reports on a central server. Other capabilities such as the grouping of nodes into scan groups, flexible output report formats, and customized scan options are valuable for large environments.</P>
<P>Using a scanner is actually simple. If you don&#146;t require any customization, by default the scanner will look for a preconfigured list of vulnerabilities and report the results to you. Usually, the results are saved in a file so that you can come back later to review the findings. The scanner works by either examining attributes of objects, such as owner and permissions for files or by emulating the hacker. To act as a hacker, the scanner runs a variety of scripts that try to exploit weaknesses in the target node. To keep the systems and networks from being overloaded, you should give careful thought to what you want to scan and when you want to scan for it. Otherwise, you might find that your entire site becomes sluggish because the mission-critical servers are busy responding to a simulated SYN Flood attack.</P>
<P>Scanning is not limited to computers. Routers and other switching devices also can be scanned, because they, too, have been exposed in the public news forums for containing security flaws.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="209-211.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="214-217.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
婷婷中文字幕综合| 性久久久久久久久| 欧美一区二区三区视频在线| 精品午夜一区二区三区在线观看| 亚洲免费在线视频一区 二区| 日韩一区二区中文字幕| 波多野洁衣一区| 久久国产精品区| 三级在线观看一区二区| 亚洲男人天堂一区| 亚洲女爱视频在线| 国产欧美一区二区精品秋霞影院| 欧美高清视频不卡网| 色系网站成人免费| 成人性生交大片免费看视频在线| 久久国产精品第一页| 日韩中文欧美在线| 亚洲成人777| 亚洲综合精品自拍| 亚洲欧美色图小说| 中文字幕在线观看一区| 国产丝袜欧美中文另类| 久久久久久久久久久久电影| 日韩一区二区三区电影| 欧美日韩你懂的| 欧美午夜一区二区三区| 91麻豆免费观看| 99久久久久久| 538在线一区二区精品国产| 亚洲人123区| 国产iv一区二区三区| 美脚の诱脚舐め脚责91| 午夜精品一区二区三区三上悠亚| 亚洲人成网站色在线观看| 久久精品人人爽人人爽| 欧美草草影院在线视频| 日韩欧美一区二区免费| 日韩一区二区在线观看视频| 69堂成人精品免费视频| 欧美日韩亚洲另类| 91麻豆精品国产91久久久久久 | 91丨porny丨在线| 成人丝袜高跟foot| 北岛玲一区二区三区四区| 99久久免费国产| 久久久久久久性| 日韩一区二区三区视频在线| av综合在线播放| 欧美性高清videossexo| 99国产精品久久| 一本久久a久久精品亚洲| 色综合久久88色综合天天6 | 亚洲精品视频免费看| 亚洲视频在线一区二区| 亚洲欧美激情在线| 亚洲国产日韩在线一区模特| 亚洲一区二区三区四区在线| 日韩国产一二三区| 久草这里只有精品视频| 国产精品一级在线| 91啪九色porn原创视频在线观看| 91色porny在线视频| 欧洲另类一二三四区| 欧美高清视频www夜色资源网| 欧美成人一区二区三区| 国产欧美日韩卡一| 亚洲精品成人悠悠色影视| 亚洲在线视频网站| 久久精品国产免费看久久精品| 国产一区美女在线| 91丨九色丨黑人外教| 91麻豆精品国产91久久久资源速度| 久久综合五月天婷婷伊人| 中文字幕五月欧美| 亚洲一二三四久久| 久久99精品久久久久久动态图 | 欧美日韩国产在线播放网站| 精品日韩在线一区| 不卡的av网站| av电影在线观看完整版一区二区 | 91丨porny丨户外露出| 午夜精品久久久| 亚洲一级在线观看| 99精品视频在线播放观看| 成人网在线免费视频| ㊣最新国产の精品bt伙计久久| 欧美日韩一区二区三区高清| 免费看黄色91| 九色|91porny| 国产一区二区视频在线播放| 欧美日韩国产一级片| 在线成人av网站| 日韩三级中文字幕| 欧美激情一区在线观看| 亚洲国产日韩av| 欧美精品久久99| 欧美成人猛片aaaaaaa| 国产精品欧美极品| 亚洲图片欧美综合| 欧美三级一区二区| 69堂成人精品免费视频| 国产女人18水真多18精品一级做 | 国产精品国产自产拍高清av | 日韩一区欧美二区| 日韩欧美一区在线| 国产免费久久精品| 日韩精品国产精品| 97久久久精品综合88久久| 欧美精品一区二区三区高清aⅴ| 夜夜嗨av一区二区三区四季av| 国产成人免费在线| 制服丝袜av成人在线看| 亚洲精品乱码久久久久久| 日韩精品一区二区三区视频播放 | 国产精品网站在线观看| 久久先锋资源网| 国内精品免费在线观看| 在线电影国产精品| 色婷婷av一区二区三区大白胸 | 亚洲1区2区3区4区| 国产成a人亚洲精| 日韩精品在线一区二区| 午夜亚洲福利老司机| 91国产福利在线| 亚洲女人****多毛耸耸8| 久久精品999| 日韩天堂在线观看| 日韩精品免费视频人成| 欧美美女bb生活片| 亚洲大片免费看| 欧美色成人综合| 亚洲另类春色校园小说| 国产乱码精品一区二区三区忘忧草 | 天堂久久久久va久久久久| 91啦中文在线观看| 一区二区三区不卡在线观看| 一本一本大道香蕉久在线精品| 国产成人午夜电影网| 亚洲视频一二区| 夜夜精品浪潮av一区二区三区 | 精品一区二区免费| 亚洲一二三四久久| 日本一区二区三区高清不卡| 26uuu精品一区二区在线观看| 欧美精品欧美精品系列| 欧美手机在线视频| 欧美久久婷婷综合色| 一本大道久久a久久精二百| 狠狠色狠狠色综合日日91app| 日韩1区2区日韩1区2区| 老司机精品视频线观看86| 中文字幕视频一区| 亚洲视频每日更新| 亚洲乱码中文字幕| 日韩精品一二区| 福利一区二区在线观看| 色婷婷综合中文久久一本| 色综合久久九月婷婷色综合| 色8久久人人97超碰香蕉987| 欧美精品1区2区| 国产主播一区二区| 狠狠色丁香婷婷综合| 五月激情六月综合| 亚洲va欧美va天堂v国产综合| 青青草国产成人av片免费| 午夜日韩在线电影| 激情六月婷婷综合| 在线电影欧美成精品| 亚洲欧洲av在线| 国产一区二区伦理| 日韩一级片在线播放| 亚洲黄色免费电影| av影院午夜一区| 中文av一区二区| 99免费精品视频| 国产精品免费视频一区| 丁香一区二区三区| 久久中文字幕电影| 日韩中文欧美在线| 欧美zozo另类异族| 另类中文字幕网| 欧美大尺度电影在线| 亚洲一区在线看| 色综合网色综合| 亚洲欧洲精品一区二区三区不卡| 久久国产精品72免费观看| 国产亚洲精品中文字幕| 国产一区二区主播在线| 日韩欧美一级二级三级久久久| 一区二区三区自拍| 91精彩视频在线观看| 日韩精品乱码免费| 日韩视频永久免费| 国产高清在线观看免费不卡| 国产亚洲一二三区| 白白色 亚洲乱淫| 欧美不卡123| 欧美激情在线一区二区| 国产一区二区不卡老阿姨| 国产视频一区在线观看|