Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 1.401 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
1.401
Dung lượng
4,37 MB
Nội dung
[...]... monitoring illegal entry attempts, ManagingSecuritywithSnortandIDSTools provides step-by-step instructions on getting up and running withSnort 2.1, and how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices • • • • • • Table of Contents Index Reviews Reader Reviews Errata Academic ManagingSecuritywithSnortandIDS To By Kerry J Cox, Christopher... (800) 998-9938 or corporate@oreilly.com Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc ManagingSecuritywithSnortandIDS Tools, the image of a man on a rope with an ax, and related trade dress are trademarks of O'Reilly Media, Inc Many of the designations used by manufacturers and sellers to distinguish their products are claimed... Sites of Interest Chapter 11 Using SnortCenter as a SnortIDS Management Console Section 11.1 SnortCenter Console Installation Section 11.2 SnortCenter Agent Installation Section 11.3 SnortCenter Management Console Section 11.4 Logging In and Surveying the Layout Section 11.5 Adding Sensors to the Console Section 11.6 Managing Tasks Chapter 12 Additional Tools for SnortIDS Management Section 12.1 Open... C.4 From Chapter 6: Deploying Snort Section C.5 From Chapter 7: Creating andManagingSnort Rules Section C.6 From Chapter 8: Intrusion Prevention Section C.7 From Chapter 10: Using ACID as a SnortIDS Management Console Section C.8 From Chapter 12: Additional Tools for SnortIDS Management Section C.9 From Chapter 13: Strategies for High-Bandwidth Implementations of Snort Colophon Index Copyright... Academic ManagingSecuritywithSnortandIDS To By Kerry J Cox, Christopher Gerg Publisher : O'Reilly Pub Date : August 2004 ISBN : 0-596-00661-6 Pages : 288 This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing. .. discussion of ways to utilize Snort as a sniffer, a network gateway that blocks malicious traffic, and a passive IDS sensor Details on how to configure and tune your SnortIDS installation to maximize the effectiveness and minimize the labor involved in detecting and tracking down attacks An in-depth look at a variety of administration tools that assist in the management of the SnortIDS environment Strategies... Barnyard (and Sguil) 13.2 Commericial IDS Load Balancers 13.3 The IDS Distribution System (I(DS)2) Appendix A Snortand ACID Database Schema A.1 acid_ag Appendix B The Default snort. conf File Appendix C Resources C.1 From Chapter 1: Introduction C.2 From Chapter 2: Network Traffic Analysis C.3 From Chapter 4: Know Your Enemy C.4 From Chapter 6: Deploying Snort C.5 From Chapter 7: Creating andManaging Snort. .. Packet capture and analysis using a variety of command-line and GUI utilities An introduction to the interpretation of packet headers and content within an IDS environment The threats to your organization's technology assets Instructions for installing, configuring, tuning, and customizing an open source, enterprise-level network intrusion detection system (NIDS) for use in corporate and/ or home office... deploying an IDS in switched, high -security, and highbandwidth environments Audience This book is designed for network, system, andsecurity administrators of large-scale enterprises as well as managers of small businesses or home offices The instructions should be readable for those with only a small amount of network and Unix experience, but also useful for experienced administrators with a varied... Installing Snort Section 3.1 About Snort Section 3.2 Installing Snort Section 3.3 Command-Line Options Section 3.4 Modes of Operation Chapter 4 Know Your Enemy Section 4.1 The Bad Guys Section 4.2 Anatomy of an Attack: The Five Ps Section 4.3 Denial-of-Service Section 4.4 IDS Evasion Section 4.5 Sites of Interest Chapter 5 The snort. conf File Section 5.1 Network and Configuration Variables Section 5.2 Snort . applications and the
GUI interfaces for managing
them. A comprehensive
resource for monitoring illegal
entry attempts, Managing
Security with Snort and IDS
Tools. Contents
• Index
• Reviews
• Reader Reviews
• Errata
• Academic
Managing Security with Snort and IDS Tools
By Kerry J. Cox, Christopher Gerg
Publisher : O'Reilly
Pub