1. Trang chủ
  2. » Công Nghệ Thông Tin

Managing Security with Snort and IDS Tools pptx

1,4K 533 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 1.401
Dung lượng 4,37 MB

Nội dung

[...]... monitoring illegal entry attempts, Managing Security with Snort and IDS Tools provides step-by-step instructions on getting up and running with Snort 2.1, and how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices • • • • • • Table of Contents Index Reviews Reader Reviews Errata Academic Managing Security with Snort and IDS To By Kerry J Cox, Christopher... (800) 998-9938 or corporate@oreilly.com Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc Managing Security with Snort and IDS Tools, the image of a man on a rope with an ax, and related trade dress are trademarks of O'Reilly Media, Inc Many of the designations used by manufacturers and sellers to distinguish their products are claimed... Sites of Interest Chapter 11 Using SnortCenter as a Snort IDS Management Console Section 11.1 SnortCenter Console Installation Section 11.2 SnortCenter Agent Installation Section 11.3 SnortCenter Management Console Section 11.4 Logging In and Surveying the Layout Section 11.5 Adding Sensors to the Console Section 11.6 Managing Tasks Chapter 12 Additional Tools for Snort IDS Management Section 12.1 Open... C.4 From Chapter 6: Deploying Snort Section C.5 From Chapter 7: Creating and Managing Snort Rules Section C.6 From Chapter 8: Intrusion Prevention Section C.7 From Chapter 10: Using ACID as a Snort IDS Management Console Section C.8 From Chapter 12: Additional Tools for Snort IDS Management Section C.9 From Chapter 13: Strategies for High-Bandwidth Implementations of Snort Colophon Index Copyright... Academic Managing Security with Snort and IDS To By Kerry J Cox, Christopher Gerg Publisher : O'Reilly Pub Date : August 2004 ISBN : 0-596-00661-6 Pages : 288 This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing. .. discussion of ways to utilize Snort as a sniffer, a network gateway that blocks malicious traffic, and a passive IDS sensor Details on how to configure and tune your Snort IDS installation to maximize the effectiveness and minimize the labor involved in detecting and tracking down attacks An in-depth look at a variety of administration tools that assist in the management of the Snort IDS environment Strategies... Barnyard (and Sguil) 13.2 Commericial IDS Load Balancers 13.3 The IDS Distribution System (I(DS)2) Appendix A Snort and ACID Database Schema A.1 acid_ag Appendix B The Default snort. conf File Appendix C Resources C.1 From Chapter 1: Introduction C.2 From Chapter 2: Network Traffic Analysis C.3 From Chapter 4: Know Your Enemy C.4 From Chapter 6: Deploying Snort C.5 From Chapter 7: Creating and Managing Snort. .. Packet capture and analysis using a variety of command-line and GUI utilities An introduction to the interpretation of packet headers and content within an IDS environment The threats to your organization's technology assets Instructions for installing, configuring, tuning, and customizing an open source, enterprise-level network intrusion detection system (NIDS) for use in corporate and/ or home office... deploying an IDS in switched, high -security, and highbandwidth environments Audience This book is designed for network, system, and security administrators of large-scale enterprises as well as managers of small businesses or home offices The instructions should be readable for those with only a small amount of network and Unix experience, but also useful for experienced administrators with a varied... Installing Snort Section 3.1 About Snort Section 3.2 Installing Snort Section 3.3 Command-Line Options Section 3.4 Modes of Operation Chapter 4 Know Your Enemy Section 4.1 The Bad Guys Section 4.2 Anatomy of an Attack: The Five Ps Section 4.3 Denial-of-Service Section 4.4 IDS Evasion Section 4.5 Sites of Interest Chapter 5 The snort. conf File Section 5.1 Network and Configuration Variables Section 5.2 Snort . applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, Managing Security with Snort and IDS Tools. Contents • Index • Reviews • Reader Reviews • Errata • Academic Managing Security with Snort and IDS Tools By Kerry J. Cox, Christopher Gerg Publisher : O'Reilly Pub

Ngày đăng: 23/03/2014, 00:20

TỪ KHÓA LIÊN QUAN