亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 155-160.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=5//-->
<!--PAGES=155-160//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch04/153-154.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="160-163.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2 ALIGN="CENTER"><FONT COLOR="#000077"><I>PART 2<BR>Intrusion Detection: Beyond Traditional Security
</I></FONT></H2>
<P>Now that you&#146;ve examined the roles and limitations of traditional security tools, it&#146;s time to take a closer look at intrusion detection. In this part of the book, you&#146;ll see how attackers can get through your existing defenses and how intrusion detection systems (IDSs) detect these events. This part includes four chapters that describe the following:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;What intrusion detection is, how this tool category differs from others, and the value that intrusion detection brings to your site
<DD><B>&#149;</B>&nbsp;&nbsp;How vulnerability scanner intrusion detection tools look for known program bugs or configuration errors to warn you of security holes
<DD><B>&#149;</B>&nbsp;&nbsp;How system-level intrusion detection catches activities that many other products miss
<DD><B>&#149;</B>&nbsp;&nbsp;How network-level intrusion detection sees hacker activities by inspecting network packets
</DL>
<P>As you learn about each of these IDSs, you also will be asked to think about the problems they do <I>not</I> solve. Your insights will help you understand the role that an IDS fulfills at your site. Also, thinking about how an IDS can be improved is necessary for evaluating future releases of IDSs.</P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Chapter 5<BR>Intrusion Detection and Why You Need It
</FONT></H2>
<P>Within the last two to three years, many people thought that if they wanted to connect to the Internet, only a firewall was necessary to complete the security puzzle. In this chapter, you start by looking at how common scenarios you expect to be secure are really not. As you see why hackers can still get through, you will realize the value that an <I>Intrusion Detection System</I> (IDS) adds.</P>
<P>After going through these detailed examples, the central themes of an IDS are explained. In this chapter, you can read about the different type of IDSs, design tradeoffs in building an IDS, and learn the critical questions to ask about an IDS tool you might be considering. When you have finished this material, you will be ready to jump into the next few chapters, which describe specific IDS approaches in more detail.</P>
<H3><A NAME="Heading2"></A><FONT COLOR="#000077">Do You Have Protection?</FONT></H3>
<P>Figure 5.1 contains a diagram of an Internet configuration for a company with a public Web server. Notice that the Web server itself is encased in a perimeter network. At first, people tried to directly attach Web servers to the Internet without screening routers or firewalls to block attacks at the Internet entry point. This configuration was tried despite warnings from Morris (1986) and Bellovin (1988), which were discussed in Chapter 4, &#147;Traditional Network Security Approaches.&#148; However, now it is rare to see a Web server connected directly to the Net without protection as shown in Figure 5.1. The question to ask is whether this Web server is safe from security breaches.
</P>
<P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/05-01.jpg',499,619 )"><IMG SRC="images/05-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/05-01.jpg',499,619)"><FONT COLOR="#000077"><B>Figure 5.1</B></FONT></A>&nbsp;&nbsp;Common perimeter configuration for a Web server.</P>
<P>If the answer is &#147;Yes,&#148; this chapter will certainly be short. As history has shown, almost no server is immune to penetration. The problem is that we can defend only against attacks known about today. Nothing <I>prevents</I> a publicly accessible system from being compromised by an attack that is newly discovered tomorrow.</P>
<P>The untrusted Internet and the perimeter network in Figure 5.1 are separated by a screening router. What is the role of the screening router in this configuration? TCP/IP packet level attacks that require address impersonation (or IP address spoofing) are eliminated by the router because it is configured to do the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Block any inbound packet from the Internet to the perimeter that has a source IP address from the perimeter network
<DD><B>&#149;</B>&nbsp;&nbsp;Block any outbound packet from the perimeter to the Internet that has a source address from outside the perimeter network
<DD><B>&#149;</B>&nbsp;&nbsp;Block any inbound packet with source routing enabled
</DL>
<P>The screening router may be configured to block other attacks, such as Ping of Death or SYN Flood, which are targeted at the Web server. Other threats also may be addressed if the router is sophisticated enough. One thing that this screen will definitely <I>not</I> block is HTTP traffic. Otherwise, no one would be able to connect to the Web server.</P>
<P>Chances are that the router does not perform any application-specific checking of the network packets, such as looking at the URL being requested in incoming packets. Screening routers apply access control using network concepts, such as source address, destination address, port number, and TCP header field settings.</P>
<P>Several reasons why this common configuration alone is not enough for a secure defense are as follows:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Vendor software on one of these systems contains a software bug that will result in a security problem. The bug could be in the operating system, in the Web server, or in the router implementation.
<DD><B>&#149;</B>&nbsp;&nbsp;Executable programs or scripts created at your site and called by the Web server can have flaws.
<DD><B>&#149;</B>&nbsp;&nbsp;One or more of the defense mechanisms will not be configured properly. Ample data supports this claim. When Dan Farmer ran a few scans against public Web servers in 1997, he found well over 80 percent to be open to some form of attack.
</DL>
<P>These items should be familiar by now because they are variations on the common reasons why hackers get through&#151;software bugs or configuration errors.
</P>
<P>In 1997, a rather nasty flaw in the <I>Microsoft Internet Information Server</I> (IIS) was discovered. With a little effort, it was possible to discover a URL of a particular length that would crash IIS. Anyone with a Web browser could send a URL of this size in HTTP. IIS would process the URL to open it, but a bounds checking problem caused IIS to hang or crash instead. Microsoft fixed the bug, but it serves as a good example of something that first-level defenses, such as screening routers, were not checking for at that time. The attack did not give the hacker access to the server, and therefore, Web site content remained safe. However, if a company had been depending on the Web site for revenue, the down time would have had a measurable impact. <I>The perimeter network shown in Figure 5.1 did not stop this attack because HTTP packets were allowed into the Web server.</I></P>
<P>Microsoft was not the only vendor hit as a consequence of program errors. The Apache Web server also had a serious bug that impacted several sites. Writing error-free code is difficult, and as long as there is a possibility for bugs, a potential for security threatening consequences exists, as shown in Figure 5.1.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="../ch04/153-154.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="160-163.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
毛片av一区二区| 最新国产成人在线观看| 午夜精品久久一牛影视| 国产在线视频不卡二| 精品剧情v国产在线观看在线| 日韩av中文字幕一区二区三区| 99久久精品国产一区二区三区| 国产亚洲欧美在线| 国产电影精品久久禁18| 91免费版pro下载短视频| 欧美精品第一页| 亚洲一区二区三区国产| 欧美日韩免费观看一区二区三区 | 男人的j进女人的j一区| 91精品国产日韩91久久久久久| 人禽交欧美网站| 久久综合九色综合97婷婷 | 在线观看日韩av先锋影音电影院| 亚洲欧美日韩精品久久久久| 欧美日韩精品一区视频| 蜜芽一区二区三区| 国产精品五月天| 欧美日韩免费观看一区二区三区| 麻豆精品国产91久久久久久| 亚洲国产精品t66y| 5566中文字幕一区二区电影| 国产一区二区导航在线播放| 亚洲色图视频网站| 精品久久久久久久久久久院品网| 成人h精品动漫一区二区三区| 一区二区三区日本| 日韩精品一区二区三区老鸭窝| 国产成人av一区| 免费观看在线综合| 中文字幕一区av| 亚洲精品一线二线三线| 日本精品一级二级| 国产激情精品久久久第一区二区| 亚洲成av人在线观看| 国产精品女主播av| 精品久久人人做人人爰| 99麻豆久久久国产精品免费| 一区二区三区精品久久久| 久久久久国产精品人| 欧美精选在线播放| 在线视频一区二区三区| 国产69精品久久777的优势| 美国三级日本三级久久99| 一区二区三区视频在线看| 国产视频一区不卡| 亚洲精品一区二区三区福利| 欧美在线啊v一区| 色先锋资源久久综合| av中文字幕在线不卡| 蜜臀av性久久久久蜜臀aⅴ流畅| 亚洲黄色小视频| 亚洲欧美电影一区二区| 国产精品美女久久久久久久| 国产三级精品视频| 久久综合九色综合欧美就去吻 | 亚洲免费观看在线观看| 国产亚洲一区二区在线观看| 久久先锋资源网| 欧美一区二区三区四区在线观看| 在线中文字幕不卡| 奇米在线7777在线精品| 中文字幕 久热精品 视频在线| 久久久午夜电影| 欧美国产精品v| 成人免费在线播放视频| 亚洲天堂网中文字| 午夜天堂影视香蕉久久| 日本亚洲免费观看| 国产精品自拍网站| 成人久久18免费网站麻豆| 91在线观看下载| 在线观看一区日韩| 欧美一级xxx| 中文字幕av不卡| 亚洲国产sm捆绑调教视频| 蜜臀av一区二区| 成人精品gif动图一区| 91首页免费视频| 91精品国产一区二区| 久久综合久久综合九色| 亚洲免费观看在线视频| 免费观看日韩av| 99久久精品99国产精品| 欧美日韩在线三级| 日本一区二区三区在线不卡| 亚洲女人的天堂| 国内精品不卡在线| 欧美日韩国产首页| 国产亚洲一区二区三区| 午夜久久电影网| 99久久精品免费精品国产| 日韩一卡二卡三卡| 一区二区三区高清不卡| 亚洲一线二线三线久久久| 国产乱码精品1区2区3区| 欧美日韩久久一区二区| 欧美国产一区在线| 蜜桃在线一区二区三区| 欧美综合天天夜夜久久| 欧美激情中文不卡| 激情五月激情综合网| 欧美精品色综合| 亚洲靠逼com| 波多野结衣一区二区三区| 日韩欧美一区电影| 午夜精品一区二区三区三上悠亚 | 欧洲一区二区三区免费视频| 日韩午夜在线观看视频| 亚洲成av人片一区二区三区| 91美女片黄在线观看91美女| 国产午夜一区二区三区| 九一久久久久久| 91精品国产综合久久精品麻豆 | 夜夜夜精品看看| 色av综合在线| 玉米视频成人免费看| av高清久久久| 亚洲人成网站色在线观看 | 久久精品人人做| 国模套图日韩精品一区二区| 欧美一区二区三区在线观看 | 亚洲欧美另类在线| 欧日韩精品视频| 一区二区三区免费网站| 狠狠色丁香婷综合久久| 97se亚洲国产综合自在线| 久久日一线二线三线suv| 丁香六月久久综合狠狠色| 国产亚洲欧美一级| 成人aa视频在线观看| 亚洲免费伊人电影| 在线观看91精品国产麻豆| 日韩精品一区第一页| 日韩一区二区三区免费看 | 亚洲一区二区3| 欧美一三区三区四区免费在线看| 久久精品免费观看| 国产精品美女视频| 在线电影欧美成精品| 国产一区二区调教| 亚洲成人自拍一区| 久久精品夜色噜噜亚洲aⅴ| 99免费精品在线| 久久成人av少妇免费| 一区视频在线播放| 日韩亚洲欧美中文三级| 精品一区二区在线视频| 亚洲精品成人天堂一二三| 欧美videos大乳护士334| 91在线一区二区三区| 久久精品999| 夜夜精品视频一区二区 | 色噜噜狠狠成人网p站| 另类成人小视频在线| 亚洲永久免费av| 国产欧美日韩中文久久| 91麻豆福利精品推荐| 国产一区二区日韩精品| 亚洲成人av福利| 亚洲免费高清视频在线| 国产亚洲污的网站| 91精品国产综合久久蜜臀| 色综合久久久网| 国产精品一区二区在线看| 亚洲成av人**亚洲成av**| 日本一区二区三区在线不卡| 欧美日韩一区成人| 99精品欧美一区二区三区小说| 国产一区二区在线看| 麻豆精品视频在线| 亚洲另类春色国产| 日韩码欧中文字| 亚洲人成电影网站色mp4| 1000精品久久久久久久久| 亚洲国产成人午夜在线一区| 国产日本欧洲亚洲| 久久精品欧美一区二区三区麻豆 | 99riav久久精品riav| 不卡一区中文字幕| jizzjizzjizz欧美| 成人视屏免费看| 99热精品国产| 91久久精品国产91性色tv| 欧美日韩在线直播| 欧美一区二区女人| 欧美成人a视频| 国产日韩欧美精品在线| 久久影院午夜论| 久久久久免费观看| 久久久久9999亚洲精品| 久久先锋影音av鲁色资源网| 精品久久久久香蕉网| 精品久久久久久最新网址| 欧美精品一区二区不卡| 精品国产三级a在线观看|