亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 163-167.html

?? 入侵檢測的相關(guān)教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.programminglanguages.html">Programming
			<option value="/reference/dir.security1.html">Security	
			<!-- <option value="/reference/dir.ewtraining1.html">Training Guides -->
			<option value="/reference/dir.userinterfaces.html">UI
			<option value="/reference/dir.webservices.html">Web Services
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=5//-->
<!--PAGES=163-167//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="160-163.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="167-169.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>In Chapter 2, &#147;The Role of Identification and Authentication in Your Environment,&#148; you saw ways to improve the security of I&#38;A by using techniques or tools that defended against threats such as password cracking and network sniffing. It&#146;s clear that access control is needed beyond I&#38;A for a complete security model, but why do you need intrusion detection in addition to I&#38;A?
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Even improved authentication products, such as Kerberos, have been hacked. Weaknesses in the protocol have been described in Chapter 2 and elsewhere (Bellovin and Merritt, 1991; Dole, Lodin, and Spafford 1997; Mudge 1996).
<DD><B>&#149;</B>&nbsp;&nbsp;In 1997 the integrated Solaris-DCE login facility also had a serious flaw that rendered I&#38;A untrustworthy. A similar flaw appeared in Silicon Graphics&#146; IRIX operating system in 1998.
<DD><B>&#149;</B>&nbsp;&nbsp;Early versions of Security Dynamics ACE server also had problems that you saw in Chapter 2.
<DD><B>&#149;</B>&nbsp;&nbsp;A flaw in AIX rlogin allowed remote users to gain root access.
</DL>
<P>There are many other examples of failed I&#38;A subsystems. Because bugs or loose adherence to corporate security guidelines will always exist, <I>I&#38;A will not prevent all hacks</I>. You must at least monitor the activities of users, including simple events such as failed login attempts, in order to detect problems. Preferably, you want to detect attacks in real time and have some automated responses to provide a scalable solution. Deploying an IDS that can detect attack patterns in I&#38;A event data helps you get a handle on your security problems.</P>
<P>To reiterate a theme introduced in the opening chapter of this book:</P>
<DL>
<DD><I>Good security requires prevention, detection, and responses.</I>
</DL>
<H4 ALIGN="LEFT"><A NAME="Heading5"></A><FONT COLOR="#000077">Beyond Access Control</FONT></H4>
<P>There are similar concerns about access control mechanisms that are responsible for <I>preventing</I> unwanted actions. For nonnetwork resources, such as files, directories, devices, and IPC data structures, access control is designed to limit how subjects and objects interact. To effectively carry out its responsibilities, the reference monitor needs an access control database that is properly configured with the security policy to enforce. This database is the first place things can go wrong. As you saw earlier, either the vendor or your site administrator can improperly configure access control rules (or other aspects of your security policy) that lead to compromises. Remember, properly specifying access control rules for files and directories is an exceedingly complex task as the number of subjects and objects grows.</P>
<P>Next, if there are any bugs in the reference monitor itself, access control will not prevent violations of the policy. Although buffer overflows in privileged programs are not the fault of the reference monitor, these flaws are used to bypass the access control policy defined for the system. Perhaps the greatest latent threat is the large number of home-grown applications or custom programs that contain bugs or configuration errors which can lead to intrusions. As more enterprises connect these legacy back-end applications to front-end Web servers, the risk of penetrations increases.</P>
<P>When your system access control policy is violated, you also want to be able to detect the activity as soon as possible and have a scalable solution for responses. An IDS can add value here. An IDS is designed to detect and respond to attacks that get past your access control systems. The same is true for network access control.</P>
<H4 ALIGN="LEFT"><A NAME="Heading6"></A><FONT COLOR="#000077">Beyond Network Security</FONT></H4>
<P>How could it be possible that firewalls and encryption techniques are not enough? A few examples are worth walking through in detail.
</P>
<P>In Figure 5.3, a packet-filtering firewall has been configured to allow HTTP traffic to travel in both directions. Two example hacks that can flow through this pipe are <I>test.cgi</I> and <I>phf</I>. Even if these two CGIs in particular are not running at your site, and hopefully they are not, there is always a risk that some internal CGI program has an exploitable weakness.</P>
<P><A NAME="Fig3"></A><A HREF="javascript:displayWindow('images/05-03.jpg',499,556 )"><IMG SRC="images/05-03t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/05-03.jpg',499,556)"><FONT COLOR="#000077"><B>Figure 5.3</B></FONT></A>&nbsp;&nbsp;Intrusions unaffected by access control in the firewall.</P>
<P>An increasingly common configuration is shown in Figure 5.4. Here, the perimeter network contains a Web server that must contact a business back-end server to complete the interaction with the customer. In these configurations a proprietary gateway program often communicates through the firewall with the back-end server inside the trusted network. The next few paragraphs describe some problems with this scenario.
</P>
<P><A NAME="Fig4"></A><A HREF="javascript:displayWindow('images/05-04.jpg',467,498 )"><IMG SRC="images/05-04t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/05-04.jpg',467,498)"><FONT COLOR="#000077"><B>Figure 5.4</B></FONT></A>&nbsp;&nbsp;Gateways are paths for intruders.</P>
<P>Even if customers are using digital certificates to authenticate to the Web server, this same credential is not necessarily meaningful in the security context of the database. The Web server and the database are separated by a security boundary with different subjects, objects, and ACLs. Some customer sites have granted the gateway program, running on the Web server, <I>unlimited</I> access to the database. In other words, when the gateway program connects to the database, it does so with the highest privileges when accessing the database. This programming choice alone should be enough of a reason to run an IDS on the database server.</P>
<P>The gateway program and the back-end server establish a client-server or peer-to-peer relationship. At a minimum, they communicate using a network protocol. Administrators know that certain Internet application protocols are not safe to punch through the firewall. However, these same conscientious employees often will allow proprietary protocols used by the gateway and back-end server to flow through the firewall. People realized weaknesses in some of the Internet application protocols because flaws were discovered by hackers or researchers over a period of years. These protocols are not allowed in the perimeter or through the firewall because they are flawed. The same type of introspection is warranted for private protocols that exist at your site, although private protocols are seldom given the same type of scrutiny. Private application protocols between the perimeter and the trusted network, or those run totally within the trusted network, are also potentially open to attack. Only by monitoring the activities of the participating nodes with an IDS can you be sure that your security policy is not weakened by proprietary application protocols deployed at your site. Although the IDS may not look at the protocol itself, it will detect improper activities on the system that result from weaknesses in private protocols.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="160-163.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="167-169.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人国产一区二区三区精品| 精品久久人人做人人爱| 国产精品久久久久久一区二区三区 | 99久久99久久精品国产片果冻| 欧美mv和日韩mv的网站| 国产精品99久久久| 国产精品毛片高清在线完整版| 捆绑调教一区二区三区| 日韩欧美中文字幕制服| 久久精品国产第一区二区三区 | 成人免费视频一区二区| 欧美高清在线一区| 日本乱人伦aⅴ精品| 亚洲一区二区在线视频| 欧美一区二区日韩| 激情文学综合丁香| 欧美激情一区二区三区蜜桃视频| 国产成人自拍在线| 亚洲人xxxx| 制服视频三区第一页精品| 国产精品白丝jk黑袜喷水| 亚洲天堂网中文字| 在线电影一区二区三区| 国产精品66部| 亚洲高清不卡在线观看| 国产日韩三级在线| 欧美无砖专区一中文字| 高潮精品一区videoshd| 亚洲成人综合在线| 国产欧美一区二区在线| 欧美中文字幕一区| 丰满白嫩尤物一区二区| 天天色 色综合| 国产亚洲欧美日韩日本| 欧美视频中文字幕| 99热国产精品| 国产精品18久久久久久久网站| 亚洲欧美日韩国产综合| xf在线a精品一区二区视频网站| 99久久精品久久久久久清纯| 极品少妇一区二区| 蜜桃av噜噜一区| 日韩高清中文字幕一区| 亚洲777理论| 亚洲大片精品永久免费| 亚洲成人777| 青青草国产精品97视觉盛宴| 亚洲一区在线播放| 婷婷一区二区三区| 三级不卡在线观看| 黄色精品一二区| 九九在线精品视频| 国产乱人伦精品一区二区在线观看| 日产国产高清一区二区三区| 日本免费新一区视频| 老汉av免费一区二区三区| 国产精品一区一区| 丰满白嫩尤物一区二区| 91在线云播放| 69精品人人人人| 久久久久99精品一区| 国产精品毛片无遮挡高清| 亚洲自拍偷拍九九九| 日韩电影在线观看一区| 国产大陆亚洲精品国产| 91福利视频网站| 日韩情涩欧美日韩视频| 中文字幕中文字幕一区二区| 亚洲蜜臀av乱码久久精品蜜桃| 亚洲一区中文在线| 国产精品白丝av| 欧美日韩美女一区二区| 久久综合成人精品亚洲另类欧美 | 日韩精品电影一区亚洲| 国内精品免费**视频| 色狠狠一区二区三区香蕉| 69av一区二区三区| 欧美激情一区不卡| 午夜精品一区二区三区三上悠亚| 国产福利一区二区| 欧美裸体一区二区三区| 中文字幕一区二区三区四区 | 五月天激情小说综合| 欧美丝袜第三区| 国产色综合一区| 日韩专区中文字幕一区二区| 99久久婷婷国产精品综合| xnxx国产精品| 久久99国产精品成人| 欧美视频一区二区三区在线观看| 国产欧美日韩在线| 丰满白嫩尤物一区二区| 久久久久久久网| 蜜桃精品在线观看| 91麻豆精品久久久久蜜臀| 亚洲午夜成aⅴ人片| 在线视频一区二区三区| 亚洲私人影院在线观看| 成人国产免费视频| 综合久久久久久久| 成人app软件下载大全免费| 国产精品午夜免费| 色综合激情五月| 亚洲小说春色综合另类电影| 精品视频一区二区不卡| 亚洲欧美电影一区二区| 99久久er热在这里只有精品15| 国产日产欧美一区二区三区| 国产成人综合视频| 亚洲欧美日韩在线播放| 色婷婷久久久亚洲一区二区三区 | 欧美日韩在线不卡| 蜜桃精品在线观看| 国产精品婷婷午夜在线观看| 国产成人精品免费网站| 亚洲精品综合在线| 高潮精品一区videoshd| 成人国产精品免费观看视频| 日韩一区二区三区视频在线| 美女视频黄a大片欧美| 久久无码av三级| 91麻豆产精品久久久久久| 奇米影视一区二区三区小说| 日韩精品最新网址| 一本色道久久加勒比精品| 亚洲国产精品一区二区www在线| 欧美无乱码久久久免费午夜一区| 日本va欧美va瓶| 中文字幕精品三区| 精品国产免费久久| 欧美日韩高清在线| 色哟哟国产精品| 高清久久久久久| 蜜桃一区二区三区在线| 亚洲一区二区欧美| 亚洲美女屁股眼交3| 最新热久久免费视频| 国产日产欧产精品推荐色| 日韩一级大片在线观看| 337p亚洲精品色噜噜狠狠| 欧美性生活大片视频| 一本久久综合亚洲鲁鲁五月天| 成人丝袜视频网| 波多野结衣在线一区| 国产成人福利片| 不卡的电影网站| 91视频国产观看| 欧美伊人久久久久久久久影院| 成人高清免费在线播放| 色88888久久久久久影院按摩 | 精品久久久久久无| 久久精品亚洲精品国产欧美kt∨ | 色婷婷久久久久swag精品| 欧美日韩综合不卡| 日韩一区二区免费高清| 欧美精品一区二区三区一线天视频 | 亚洲婷婷国产精品电影人久久| 最新久久zyz资源站| 婷婷亚洲久悠悠色悠在线播放| 精品一区二区在线观看| 国产精品99久久久久久久女警| 成人自拍视频在线观看| 欧美亚洲国产怡红院影院| 91精品国产日韩91久久久久久| 精品国产凹凸成av人导航| 亚洲色图欧美偷拍| 日本不卡视频在线观看| 国内外成人在线| 一本色道久久综合亚洲精品按摩| 日本韩国欧美一区| 日韩欧美国产精品一区| 成人欧美一区二区三区1314| 亚洲欧美另类久久久精品| 久久www免费人成看片高清| 色综合久久久久综合体 | 91美女片黄在线| 日韩三级.com| 亚洲成av人片www| www.日韩av| 久久精品亚洲精品国产欧美kt∨| 午夜精品视频一区| 91黄色激情网站| 国产女主播一区| 国内精品久久久久影院薰衣草| 91麻豆精品久久久久蜜臀| 亚洲一区二区视频| 91碰在线视频| 综合欧美亚洲日本| 91丝袜美腿高跟国产极品老师| 国产日韩精品一区二区三区 | 日韩一区有码在线| 成人av在线资源网站| 国产日韩欧美电影| 在线日韩av片| 亚洲免费电影在线| 色老头久久综合| 亚洲一区成人在线| 欧美日韩一级大片网址| 免费成人结看片| 精品91自产拍在线观看一区|