亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 186-190.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.operatingsystems.html">OS
			<option value="/reference/dir.productivityapplications1.html">Prod Apps
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=6//-->
<!--PAGES=186-190//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="183-186.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="190-191.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H4 ALIGN="LEFT"><A NAME="Heading4"></A><FONT COLOR="#000077">External Threats</FONT></H4>
<P>When you have publicly visible systems, as almost everyone does today, there is a always a threat that someone can find a way into your systems. In the preceding chapter you saw how properly configured firewalls could allow HTTP attacks from the outside into internal systems. Systems in the perimeter network are usually the first ones to be hit. When someone attacks your system, the result could be denial of service. For example, your Web server can be slowed considerably if it is hit with a denial-of-service network attack. If someone manages to gain a login shell as a normal user, this represents the next level of severity in threats. Naturally, if someone obtains complete control over a system by gaining root or superuser privileges, and this adversary is a remote user unaffiliated with your enterprise, this represents the worst threat.
</P>
<P><FONT SIZE="+1"><B>External Denial-of-Service Threats</B></FONT></P>
<P>In Chapter 5, &#147;Intrusion Detection and Why You Need It,&#148; you saw that publicly visible network addresses are nearly impossible to defend from <I>all</I> denial-of-service attacks. If your Web server allows arbitrary users to connect, someone can write a program to generate a large number of HTTP transactions with your server as the target. The net result is a flooded Web server. Most Web servers are not designed to detect or defend against these attacks, although this is precisely the only place to adequately defend against such as threat.</P>
<P>A firewall or screening router is also not going to be of much help here because it is difficult to state a packet filtering rule for this condition. For example, a large number of HTTP packets with bad data from a single source address are hard to distinguish from a large number of well-formed HTTP packets unless your filter is smart enough to know the details of the HTTP protocol and partially assembled packets. To really solve the problem, the component that has the highest semantic view of the packets, in other words the Web server program itself, must implement this form of application-level security. If the Web server detects a series of bogus packets or even good packets from the same address in a fixed interval of time, the server could notify the firewall to block incoming traffic from that address. Of course, the clever denial-of-service hacker would just forge a series of IP addresses to avoid detection.</P>
<P><FONT SIZE="+1"><B>External Privilege Escalations</B></FONT></P>
<P>Hopefully, this class of attacks is becoming less frequent as knowledge of security problems spreads. A remote user can escalate privileges in two different ways:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;A program that does not permit logins is running on the target node but is accepting network connections (such as a Web server).
<DD><B>&#149;</B>&nbsp;&nbsp;The remote user is able to gain access to the system via a login, or in other words, a network login program is listening for external connections.
</DL>
<P>An example of the former is, of course, the Web server daemon. Poor CGI programming practices can permit remote users to execute arbitrary commands on the system, albeit only with the privileges of the Web server daemon. A rather nasty example surfaced in 1997 with some implementations of FTP.
</P>
<P>An FTP client can issue a command to the FTP server that requests multiple files at once. The client issuing the <I>mget <SUP>*</SUP></I> command is asking the server to send all files in the current directory of the server. Unfortunately, some FTP client implementations did not bother to check that the files sent by the server were only those included in the current directory. A user in a home directory who then FTPs to a malicious server and executes the <I>mget <SUP>*</SUP></I> command could find many other files being added to the home directory. The server could push viruses or Trojan Horses to the receiving client because of this bug. If a root user on a UNIX system happened to be executing one of these FTP clients from the root file system directory, the malicious FTP server could replace the password file.</P>
<P>Cases in which remote users gain login access to servers were discussed in Chapter 2, &#147;The Role of Identification and Authentication in Your Environment.&#148; Even if strong authentication is used for login proof of identity, sessions can be hijacked unless other precautions are taken. If a root or Administrator user connects remotely via a protocol that is not protecting against packet injection or session hijacking, the adversary has the opportunity to effectively have root access. The amount of damage done is dependent on what operations the protocol supports. Again, think of the Web server running as root and subject to a CGI hack to understand the consequences.</P>
<H3><A NAME="Heading5"></A><FONT COLOR="#000077">Layers of Information Sources</FONT></H3>
<P>To understand the role of various intrusion detection products, take a look at the simplified diagram shown in Figure 6.1. Here, the distinction is made between three different levels of analysis for a computing environment.
</P>
<P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/06-01.jpg',269,238 )"><IMG SRC="images/06-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/06-01.jpg',269,238)"><FONT COLOR="#000077"><B>Figure 6.1</B></FONT></A>&nbsp;&nbsp;Layers of information in the operating system.</P>
<P>At the bottom is the network layer, which can be further subdivided into many different layered components itself. For the purposes of this discussion, think of the network layer as a single entity in which all of the TCP/IP or SMB traffic is handled. At the next layer is the OS. Technically, the OS includes the network stack, but think of this OS layer as containing all of the components that are not directly responsible for processing network information. Example components at this second layer include commands, libraries, backup routines, login routines, and other core subsystems that would be in operation even if the computer were not attached to a network. (This distinction is still fuzzy because a computer can open a socket to itself even if it is not directly connected to the network. Don&#146;t think too hard about these divisions.)
</P>
<P>At the highest layer are the applications. Think of this layer as containing all of the products that are not normally delivered as part of the operating system. As the last few years have shown, the set of products in this upper level has changed drastically as OS vendors rush to include &#147;for free&#148; add-ons for product differentiation. Still, think of Lotus Notes, Oracle, DB/2, add-on mail programs, manufacturing or CAD software, and a payroll application as examples from this layer. The main idea to drive home here is that these applications typically bring along additional security models with subjects and objects beyond those that are part of the operating system.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="183-186.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="190-191.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩一区国产| 国产精品国产馆在线真实露脸 | 亚洲gay无套男同| 欧美综合在线视频| 亚洲超碰精品一区二区| 日韩欧美国产wwwww| 激情欧美日韩一区二区| 久久久久一区二区三区四区| 粉嫩13p一区二区三区| 国产精品911| 色丁香久综合在线久综合在线观看| 中文在线资源观看网站视频免费不卡| 成人a区在线观看| 午夜亚洲国产au精品一区二区| 91精品午夜视频| 国产一区不卡在线| 午夜一区二区三区在线观看| 91精品福利视频| 国产999精品久久| 麻豆91在线观看| 亚洲精品中文在线影院| 中文字幕欧美激情| 精品国产一区二区三区不卡 | 欧美性色黄大片| 国产精品一区二区久激情瑜伽| 天天av天天翘天天综合网| 成人免费视频在线观看| 欧美成va人片在线观看| 欧美一区午夜视频在线观看| 欧美日韩精品三区| 在线精品视频一区二区三四| 99re6这里只有精品视频在线观看 99re8在线精品视频免费播放 | 日本一区二区三级电影在线观看 | 国产成人亚洲精品狼色在线| 五月激情综合色| 午夜伊人狠狠久久| 另类专区欧美蜜桃臀第一页| 日韩主播视频在线| 日韩精品一二区| 久久99日本精品| 天堂在线一区二区| 看电视剧不卡顿的网站| 国精产品一区一区三区mba视频| 另类欧美日韩国产在线| 高清不卡在线观看| 99九九99九九九视频精品| 色婷婷久久久综合中文字幕| 欧美精选一区二区| 久久久久久久性| 国产色婷婷亚洲99精品小说| 国产日韩高清在线| 亚洲高清免费视频| 精品午夜久久福利影院| av亚洲精华国产精华精华| 欧美午夜不卡视频| 精品日韩在线观看| 亚洲成人精品一区| 国产麻豆精品在线观看| 欧美影视一区二区三区| 久久这里只有精品视频网| 一区二区三区国产精品| 国产美女久久久久| 在线观看日韩高清av| 欧美国产精品一区二区| 日韩精品一二三四| 在线视频综合导航| 中文字幕不卡在线观看| 久久99热99| 欧美一区二区三级| 午夜精品福利视频网站| 国产裸体歌舞团一区二区| 日韩精品一区二区三区视频播放 | 中文字幕精品—区二区四季| 日韩国产精品大片| 91.com在线观看| 亚洲国产欧美在线人成| 久久成人免费网站| 欧美一级高清片| 蜜臀av国产精品久久久久| 欧美tickle裸体挠脚心vk| 水蜜桃久久夜色精品一区的特点| 色系网站成人免费| 一二三四区精品视频| 欧美放荡的少妇| 日日骚欧美日韩| 精品国产区一区| www.性欧美| 午夜天堂影视香蕉久久| 欧美一卡二卡在线| 国产一区二区视频在线| 日韩伦理电影网| 欧美高清你懂得| 成人亚洲一区二区一| 亚洲欧美日韩中文字幕一区二区三区| 色婷婷激情综合| 精品一区二区在线观看| 亚洲欧美日韩国产综合在线| 欧美日韩精品高清| 欧美一区二区视频观看视频| 国产精品乱人伦一区二区| 欧美亚洲国产bt| 久久成人综合网| 亚洲国产精品久久久久秋霞影院 | 99麻豆久久久国产精品免费 | 一区二区三区四区av| 久久夜色精品国产噜噜av| 欧美性感一类影片在线播放| 国产乱子伦视频一区二区三区| 亚洲一区二区三区四区五区黄| 久久久久久久久蜜桃| aaa欧美色吧激情视频| 久久爱www久久做| 轻轻草成人在线| 日韩国产欧美一区二区三区| 尤物视频一区二区| 日韩理论在线观看| 国产精品成人午夜| 国产精品区一区二区三区| 日韩欧美一二三四区| 777亚洲妇女| 欧美大片拔萝卜| 久久久国产精品不卡| 国产午夜精品一区二区三区视频| 日韩精品一区二区三区蜜臀| 成人高清免费观看| 99久久亚洲一区二区三区青草| 国产精品一区二区在线看| 国产成人鲁色资源国产91色综| 狠狠色丁香久久婷婷综合_中| 美女久久久精品| 日韩精品1区2区3区| 国产在线观看一区二区| 成人黄色国产精品网站大全在线免费观看 | 狠狠色丁香婷婷综合久久片| 国产91丝袜在线播放九色| 精品一区二区在线免费观看| 久久99精品国产91久久来源| 成人国产精品免费观看视频| 欧美色老头old∨ideo| 精品久久久久久久人人人人传媒 | 在线视频国内自拍亚洲视频| 日韩一区二区三区精品视频| 亚洲精品乱码久久久久久黑人| 国产高清不卡一区| 欧美大肚乱孕交hd孕妇| 午夜av区久久| 7777精品伊人久久久大香线蕉完整版| 久久精品视频在线看| 国产suv精品一区二区6| 国产亲近乱来精品视频| 国产高清精品网站| 国产精品久久久久婷婷| 成人晚上爱看视频| 亚洲色图欧美偷拍| 欧美中文字幕一区二区三区| 尤物视频一区二区| 7777精品伊人久久久大香线蕉的 | 美女网站色91| 精品国产电影一区二区| 国产精品一卡二卡| 国产精品久久久久影院色老大| 粉嫩av一区二区三区| 亚洲欧美另类图片小说| 欧美日韩国产色站一区二区三区| 日韩精品高清不卡| 日本一区二区在线不卡| 91精彩视频在线| 国产精品影视在线观看| |精品福利一区二区三区| 欧美二区三区91| a亚洲天堂av| 激情小说欧美图片| 亚洲乱码中文字幕| 国产丝袜欧美中文另类| 欧美中文字幕不卡| 成人美女在线视频| 日韩电影在线一区二区三区| 国产三级欧美三级日产三级99 | 色噜噜夜夜夜综合网| 激情五月激情综合网| 日本不卡123| 亚洲午夜羞羞片| 成人欧美一区二区三区在线播放| 69精品人人人人| 在线观看欧美精品| 色婷婷综合久久久| 波波电影院一区二区三区| 国产乱妇无码大片在线观看| 天天综合天天综合色| 亚洲一卡二卡三卡四卡无卡久久| 国产欧美日韩卡一| 国产精品视频一二三| 日本一区二区三区dvd视频在线| 欧美白人最猛性xxxxx69交| 5月丁香婷婷综合| 91精品国产91热久久久做人人| 精品视频在线看| 91精品欧美一区二区三区综合在| 91精品国产综合久久香蕉的特点| 欧美久久久久久久久久|