亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 194-198.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:

<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=6//-->
<!--PAGES=194-198//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="191-194.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="198-201.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Also, no reason exists to prevent the routines that make up products such as RealSecure and NetRanger to be embedded in the firewall logic. Sure, all of these products drag along their own systems management frameworks for configuration and event reporting. The core IDS logic could be easily combined with a firewall to add network IDS capabilities. Whether this is practical is another question altogether. Would you rather pay the performance penalty of adding IDS code to the firewall packet filters, or would you rather put an IDS sniffer inside the secure network immediately after the firewall? Different sites would prefer one approach over the other.
</P>
<H4 ALIGN="LEFT"><A NAME="Heading10"></A><FONT COLOR="#000077">Relying on Others for Data</FONT></H4>
<P>If your IDS philosophy is to rely on data sources provided by others, you do not pay performance penalties for intercept or replacing calls. Depending on another software component for data has its drawbacks, though:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;The data is emitted by the component after the event has occurred.
<DD><B>&#149;</B>&nbsp;&nbsp;The amount of data provided may not be sufficient for the IDS model. You might not get the UID of the offending process, for example.
<DD><B>&#149;</B>&nbsp;&nbsp;The events you are interested might not be reported by the system.
<DD><B>&#149;</B>&nbsp;&nbsp;At some point, the net value of generating data decreases as the amount of resources a system consumes emitting the data increases. In other words, if the system is spending most of its time reporting events instead of running the payroll, you should question the value of your approach.
<DD><B>&#149;</B>&nbsp;&nbsp;The component emitting the data can change the format of log records. This change happens often enough so that IDS vendors are required to modify their software to keep up with OS or application changes.
<DD><B>&#149;</B>&nbsp;&nbsp;The data may not be regularly reported for that system.
</DL>
<P>This last point is particularly important. System, application, and network logging can be an expensive operation. If a customer already is accustomed to storing large log files, rolling an IDS into the environment is not going to add additional requirements. If a customer does not regularly run the auditing subsystem, some convincing is necessary if the IDS relies on the audit trails. OS auditing can generate a fairly large number of records, although all of these records do not need to be stored if the IDS runs in real time, or if the environment does not require post investigative analysis of system audit logs.
</P>
<H3><A NAME="Heading11"></A><FONT COLOR="#000077">System Data Sources</FONT></H3>
<P>For monitoring systems, the two main sources of information about OS activity are <I>syslog</I> and the <I>audit trail</I>. In NT, the audit trail is called the <I>event log</I>. Audit log and audit trail are used interchangeably.</P>
<H4 ALIGN="LEFT"><A NAME="Heading12"></A><FONT COLOR="#000077">syslog</FONT></H4>
<P>UNIX provides a common service for logging events called <I>syslog</I>. The syslogd daemon supports logging across systems, relying on IP address authentication for accepting remote log entries. By far, the more common approach is for processes to create syslog record entries and call the OS interfaces to log the event to the local syslogd daemon. The syslog configuration file controls whether events are reported to the console, a file, or both. Events from syslog also can be piped to other processes.</P>
<P>No commonly agreed upon standards exist for the format of messages logged to syslog. The record format consists of some header fields including the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;name of the logging program
<DD><B>&#149;</B>&nbsp;&nbsp;priority
<DD><B>&#149;</B>&nbsp;&nbsp;facility generating the message
<DD><B>&#149;</B>&nbsp;&nbsp;text of the message itself
</DL>
<P>The priorities for syslog in decreasing order of severity are as follows:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;emer(gency)
<DD><B>&#149;</B>&nbsp;&nbsp;alert
<DD><B>&#149;</B>&nbsp;&nbsp;crit(ical)
<DD><B>&#149;</B>&nbsp;&nbsp;err(or)
<DD><B>&#149;</B>&nbsp;&nbsp;warning
<DD><B>&#149;</B>&nbsp;&nbsp;notice
<DD><B>&#149;</B>&nbsp;&nbsp;info
<DD><B>&#149;</B>&nbsp;&nbsp;debug
</DL>
<P>Facilities provide a convenient way of indicating that the message came from a particular component of the OS. Common facility definitions include the following:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;kern(el)
<DD><B>&#149;</B>&nbsp;&nbsp;user (user processes)
<DD><B>&#149;</B>&nbsp;&nbsp;mail
<DD><B>&#149;</B>&nbsp;&nbsp;lpr (line printer)
<DD><B>&#149;</B>&nbsp;&nbsp;auth(orization subsystem)
<DD><B>&#149;</B>&nbsp;&nbsp;daemon (a system daemon)
<DD><B>&#149;</B>&nbsp;&nbsp;news
<DD><B>&#149;</B>&nbsp;&nbsp;uucp
<DD><B>&#149;</B>&nbsp;&nbsp;local<I>0..n</I>
</DL>
<P>The syslog configuration file contains entries of the following form with wildcards supported in each of the two fields of the first parameter:
</P>
<!-- CODE SNIP //-->
<PRE>
facility.priority     [TAB]     action
</PRE>
<!-- END CODE SNIP //-->
<P>One or more tab characters must separate the first parameter from the action. Possible actions are as follow:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;A destination log filename
<DD><B>&#149;</B>&nbsp;&nbsp;A user name, list of names to which the message is mailed (<SUP>*</SUP> means to all logged in users)
<DD><B>&#149;</B>&nbsp;&nbsp;The form &#64;hostname that identifies the remote syslogd to which the message should be sent
<DD><B>&#149;</B>&nbsp;&nbsp;The pipe character &#147;|&#148; followed by a program name
</DL>
<P>The syslog daemon listens on UDP port 514 by default and accepts unauthenticated datagrams from any system. Therefore, the syslog daemon is not to be run across an untrusted network. Also, syslogd will accept messages from any program. It&#146;s possible for a user program to emit <I>any</I> message onto the console.</P>
<P>Quite a bit of useful information about system behavior is available from syslog. Important information that an IDS looks for includes the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Failed and successful login events
<DD><B>&#149;</B>&nbsp;&nbsp;Failed and successful su events
<DD><B>&#149;</B>&nbsp;&nbsp;Password changes
<DD><B>&#149;</B>&nbsp;&nbsp;System reboots
</DL>
<P>For many people, the amount of information provided by syslog is sufficient for watching their systems. However, activities are logged into other files. The UNIX OS also emits other useful logs including the following:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;<I>sulog</I> that shows the use of the su command
<DD><B>&#149;</B>&nbsp;&nbsp;<I>utmp</I> recording each current login session
<DD><B>&#149;</B>&nbsp;&nbsp;<I>wtmp</I> in which login, logout, shutdown, and restart events are written
<DD><B>&#149;</B>&nbsp;&nbsp;<I>lastlog</I> in which the most recent successful and unsuccessful login events are recorded for each user
<DD><B>&#149;</B>&nbsp;&nbsp;A log file, dependent on the OS, in which bad login attempts are kept (/etc/security/failedlogin for AIX)
<DD><B>&#149;</B>&nbsp;&nbsp;Accounting files
</DL>
<P>ITA also looks at accounting files for evidence of intrusions. Accounting files are designed for charge back systems. Therefore, their entries include information such as which command a user ran, how much CPU time the command consumed, whether the user was a privileged user, whether the command ran as the result of a fork() operation, and the time the process executed. Important information you do <I>not</I> get from accounting logs is as follows:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;The full path name of the program executed
<DD><B>&#149;</B>&nbsp;&nbsp;The arguments passed to the program
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="191-194.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="198-201.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品视频九色porn| 亚洲欧美偷拍另类a∨色屁股| 伊人色综合久久天天| 东方欧美亚洲色图在线| 欧美一级黄色片| 久久99最新地址| 国产日韩欧美综合一区| 99久久精品99国产精品| 亚洲在线观看免费视频| 欧美久久免费观看| 国产成人h网站| 亚洲综合在线五月| 2欧美一区二区三区在线观看视频 337p粉嫩大胆噜噜噜噜噜91av | 亚洲国产一区视频| 欧美性色黄大片手机版| 国产福利电影一区二区三区| 亚洲欧美日韩小说| www国产精品av| 欧美日韩国产一二三| 国产另类ts人妖一区二区| 一区二区不卡在线播放 | 久久se精品一区精品二区| 久久人人爽爽爽人久久久| 91亚洲男人天堂| 国产精品正在播放| 热久久国产精品| 日韩高清欧美激情| 中文字幕日本乱码精品影院| 精品国产电影一区二区| 8x8x8国产精品| 欧美色综合久久| 色哟哟国产精品| 国产专区综合网| 狠狠色丁香久久婷婷综合_中| 洋洋成人永久网站入口| 中文字幕av不卡| 久久久久久久久蜜桃| 精品日本一线二线三线不卡| 欧美午夜不卡在线观看免费| av在线不卡观看免费观看| 高清不卡一二三区| 91婷婷韩国欧美一区二区| 99精品在线观看视频| 91美女视频网站| 欧美丝袜丝交足nylons| 欧洲生活片亚洲生活在线观看| 色噜噜久久综合| 欧美人妖巨大在线| 日韩限制级电影在线观看| 精品卡一卡二卡三卡四在线| 久久人人超碰精品| 亚洲一区在线观看免费观看电影高清| 亚洲一级二级三级在线免费观看| 亚洲国产成人91porn| 久久精品噜噜噜成人av农村| 国产 欧美在线| 欧美自拍偷拍午夜视频| 日韩一级大片在线观看| 91农村精品一区二区在线| 色婷婷激情久久| 亚洲韩国精品一区| 秋霞av亚洲一区二区三| 国产精品一级片在线观看| 99国产精品视频免费观看| 日韩欧美国产不卡| 一区二区成人在线| 国产ts人妖一区二区| 国产日产精品一区| 国产欧美精品一区| 韩国精品在线观看| 欧美美女网站色| 夜夜精品浪潮av一区二区三区| 狠狠色综合日日| 日韩精品中文字幕一区 | 日韩视频一区二区在线观看| 亚洲美女视频在线观看| 91色porny| 亚洲激情网站免费观看| 91在线视频播放地址| 国产女人18毛片水真多成人如厕 | 天天色 色综合| 欧美三级一区二区| 免费三级欧美电影| 久久综合九色综合97婷婷女人| 麻豆免费精品视频| 欧美大片在线观看| 国产91在线|亚洲| 中文字幕在线观看一区| av高清久久久| 婷婷久久综合九色综合绿巨人| 欧美高清精品3d| 国产在线乱码一区二区三区| 国产精品久久久久一区二区三区| 成人精品电影在线观看| 一区二区三区中文字幕电影| 色视频欧美一区二区三区| 日日骚欧美日韩| 国产午夜精品一区二区 | 欧美一区二区三区四区视频| 久久国产精品露脸对白| 国产精品免费av| 91精品欧美福利在线观看| 成人97人人超碰人人99| 青青草精品视频| 亚洲一区在线看| 亚洲欧美日韩成人高清在线一区| 91精品国产综合久久香蕉麻豆| 国产精品99精品久久免费| 亚洲国产精品自拍| 国产精品国产精品国产专区不片| 中文字幕亚洲不卡| 色久综合一二码| 亚洲大片在线观看| 亚洲精品欧美二区三区中文字幕| 国产高清久久久久| 亚洲女人****多毛耸耸8| 日韩一级免费观看| 欧美日韩在线播放一区| 91色综合久久久久婷婷| 国产乱子伦一区二区三区国色天香| 一区二区在线观看不卡| 国产精品黄色在线观看| 国产精品欧美精品| 国产精品家庭影院| 亚洲欧美色图小说| 亚洲美女视频在线| 午夜欧美在线一二页| 视频在线观看一区| 精品亚洲porn| 久久国产精品色婷婷| 99久久国产综合色|国产精品| 一本色道亚洲精品aⅴ| 欧美日韩亚洲丝袜制服| 日韩精品最新网址| 国产亚洲精品aa午夜观看| 中文字幕中文在线不卡住| 亚洲成av人片在线观看无码| 免费看精品久久片| 91一区一区三区| 欧美xxxx在线观看| 亚洲少妇30p| 国产大片一区二区| 欧美色爱综合网| 国产欧美va欧美不卡在线| 樱花草国产18久久久久| 国产成人精品免费网站| 欧美色综合影院| 亚洲精品国产一区二区精华液| 免费成人av在线播放| 色哟哟一区二区三区| 精品99999| 免费久久精品视频| 欧美久久久一区| 亚洲成人免费视频| 欧美亚洲国产一区在线观看网站| 久久久久久久久蜜桃| 韩日av一区二区| 精品国产乱码久久久久久浪潮| 亚洲欧美日韩精品久久久久| 国产伦精品一区二区三区免费迷| 欧美一区二区三区免费大片 | 亚洲欧美另类在线| 懂色中文一区二区在线播放| 久久久久久久一区| 国产91丝袜在线18| 综合久久久久综合| 日本韩国欧美三级| 亚洲国产精品久久久男人的天堂| 欧美伊人久久大香线蕉综合69| 成人激情小说乱人伦| 欧美高清视频在线高清观看mv色露露十八| 国产欧美一区二区精品忘忧草| 国产一区二区三区电影在线观看| 欧美电影免费观看高清完整版在线| 丝袜亚洲另类欧美| 26uuu精品一区二区| 99视频超级精品| 日韩美女视频一区| www.日韩在线| 日本三级亚洲精品| 国产女同互慰高潮91漫画| 日韩欧美在线1卡| 亚洲在线免费播放| 欧美午夜电影在线播放| 精品中文字幕一区二区小辣椒| 久久久一区二区三区捆绑**| 本田岬高潮一区二区三区| 一区二区三区在线视频观看58| 67194成人在线观看| 91丝袜美女网| 顶级嫩模精品视频在线看| 午夜欧美2019年伦理| 亚洲日本电影在线| 欧美激情一区在线观看| 欧美一卡二卡在线观看| 欧美性猛片aaaaaaa做受| 国产不卡高清在线观看视频| 奇米综合一区二区三区精品视频| 国产精品电影一区二区| 精品福利一区二区三区免费视频|