Intrusion Signatures & Analysis

Intrusion Signatures & Analysis

Author:
Intrusion Detection is a red-hot topic in today's technology and security field. You hear daily stories of networks compromised or rendered unusable by attack. The cyber-criminals behind this must be stopped. The majority of the security analysts working today are not properly trained to do their important work, and often have to learn on the job or on their own. This book empowers the security specialist to analyze and interpret the traces that they are seeing, find their source, and stop the intrusion. This book also contains must-have information for the experienced intrusion analyst.
154.00 zł
Publishing date:
Delivery:
Number of pages:
448
Publication form:
Language:
Edition:
ISBN:
9780735710634
Categories:

Intrusion Detection is a red-hot topic in today's technology and security field. You hear daily stories of networks compromised or rendered unusable by attack. The cyber-criminals behind this must be stopped. The majority of the security analysts working today are not properly trained to do their important work, and often have to learn on the job or on their own. This book empowers the security specialist to analyze and interpret the traces that they are seeing, find their source, and stop the intrusion. This book also contains must-have information for the experienced intrusion analyst.



 1. Reading Log Formats.


 2. Introduction to the Practicals.


 3. The Ten Most Critical Internet Security Threats, Part 1.


 4. The Ten Most Critical Internet Security Threats, Part 2.


 5. Reactions and Responses.


 6. Perimeter Logs.


 7. Non-Malicious Traffic.


 8. Network Mapping.


 9. Scans that Probe Systems for Information.


10. Denial Of Service (DoS)—Resource Starvation.


11. Denial Of Service (DoS)—Bandwidth Consumption.


12. Trojans.


13. Exploits.


14. Buffer Overflows with Content.


15. Fragmentation.


16. False Positives.


17. Out of Spec Packets.