Skip to:Content
|
Bottom
Cover image for Network intrusion detection : an analyst's handbook
Title:
Network intrusion detection : an analyst's handbook
Personal Author:
Publication Information:
Indianapolis : New Riders, 1999
ISBN:
9780735708686

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000005026731 TK5105.59 N673 1999 Open Access Book Book
Searching...

On Order

Summary

Summary

Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains unparalleled, practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures. Ideal for the serious security analyst, Network Intrusion Detection: An Analyst's Handbook is the tool that puts you in full control of your network's security.


Author Notes

Stephen Northcutt is a graduate of Mary Washington College. He is the author of Incident Handling: Step-by-Step and Intrusion Detection: Shadow Style, both published by the SANS Institute. He was the original developer of the Shadow intrusion detection system and served as the leader of the Department of Defense's Shadow Intrusion Detection Team for two years. Formerly the Director of the U.S. Navy's Information System Security Office at the Naval Security Warfare Center, he is currently the Chief Information Warfare Officer for the U.S. Ballistic Missile Defense Organization. Stephen is a featured lecturer and co-chair of the SANS Conference and is the program chair of the first Intrustion Detection Conference.


Excerpts

Excerpts

Introduction Our goal in writing Network Intrusion Detection, Third Edition has been toempower you as an analyst. We believe that if you read this book cover to cover,and put the material into practice as you go, you will be ready to enter theworld of intrusion analysis. Many people have read our books, or attended ourlive class offered by SANS, and the lights have gone on; then, they are off tothe races. We will cover the technical material, the workings of TCP/IP, andalso make every effort to help you understand how an analyst thinks throughdozens of examples. Network Intrusion Detection, Third Edition is offered in five parts. Part I,"TCP/IP," begins with Chapter 1, ranging from an introduction to thefundamental concepts of the Internet protocol to a discussion of RemoteProcedure Calls (RPCs). We realize that it has become stylish to begin a booksaying a few words about TCP/IP, but the system Judy and I have developed hasnot only taught more people IP but a lot more about IP as well--more thanany other system ever developed. We call it "real TCP" because thematerial is based on how packets actually perform on the network, not theory.Even if you are familiar with IP, give the first part of the book a look. We areconfident you will be pleasantly surprised. Perhaps the most important chapterin Part I is Chapter 5, "Stimulus and Response." Whenever you look ata network trace, the first thing you need to determine is if it is a stimulus ora response. This helps you to properly analyze the traffic. Please take the timeto make sure you master this material; it will prevent analysis errors as youmove forward. Tip Whenever you look at a network trace, thefirst thing you need to determine is if it is a stimulus or a response. The book continues in Part II, "Traffic Analysis" with a discussionof traffic analysis. By this, we mean analyzing the network traffic byconsideration of the header fields of the IP and higher protocol fields.Although ASCII and hex signatures are a critical part of intrusion detection,they are only tools in the analyst's tool belt. Also in Part II, we beginto show you the importance of each field, how they are rich treasures tounderstanding. Every field has meaning, and fields provide information bothabout the sender of the packet and its intended purpose. As this part of thebook comes to a close, we tell you stories from the perspective of an analystseeing network patterns for the first time. The goal is to help you prepare forthe day when you will face an unknown pattern. Although there are times a network pattern is so obvious it almost screamsits message, more often you have to search for events of interest. Sometimes,you can do this with a well-known signature, but equally often, you must searchfor it. Whenever attackers write software for denial of service, or exploits,the software tends to leave a signature that is the result of crafting thepacket. This is similar to the way that a bullet bears the marks of the barrelof the gun that fired it, and experts can positively identify the gun by thebullet. In Part III of the book, "Filters/Rules for NetworkMonitoring" we build the skills to examine any field in the packet and theknowledge to determine what is normal and what is anomalous. In this section, wepractice these skills both with TCPdump and also Snort. In Part IV, we consider the larger framework of intrusion detection. Wediscuss where you should place sensors, what a console needs to support for dataanalysis, and automated and manual response issues to intrusion detection. Inaddition, this section helps arm the analyst with information about how theintrusion detection capability fits in with the business model of theorganization. Finally, this book provides three appendixes that reference common signaturesof well-known reconnaissance, denial of service, and exploit scans. We believeyou will find this to be no fluff, packed with data from the first to the lastpage. Network Intrusion Detection, Third Edition has not been developed byprofessional technical writers. Judy and I have been working as analysts since1996 and have faced a number of new patterns. We are thankful for thisopportunity to share our experiences and insights with you and hope this bookwill be of service to you in your journey as an intrusion analyst. (c) Copyright Pearson Education. All rights reserved. Excerpted from Network Intrusion Detection: An Analyst's Handbook by Stephen Northcutt, Judy Novak All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.

Table of Contents

1 Mitnick Attackp. 1
Exploiting TCPp. 1
Detecting the Mitnick Attackp. 12
Preventing the Mitnick Attackp. 15
Summaryp. 16
2 Introduction to Filters and Signaturesp. 17
Filtering Policyp. 17
Signaturesp. 18
Filter Examplesp. 20
Policy Issues Related to Targeting Filtersp. 30
Summaryp. 32
3 Architectural Issuesp. 33
Events of Interestp. 34
Limits to Observationp. 35
Low-Hanging Fruit Paradigmp. 36
Human Factors Limit Detectsp. 37
Severityp. 39
Countermeasuresp. 40
Sensor Placementp. 41
Outside Firewallp. 42
Push/Pullp. 45
Analyst Consolep. 46
Host- or Network-Based Intrusion Detectionp. 49
Summaryp. 51
4 Interoperability and Correlationp. 53
Multiple Solutions Working Togetherp. 53
Commercial IDS Interoperability Solutionsp. 57
Correlationp. 60
SQL Databasesp. 68
Summaryp. 72
5 Network-Based Intrusion Detection Solutionsp. 75
Commercial Toolsp. 76
MS Windows-Capable Systemsp. 76
UNIX-Based Systemsp. 80
GOTSp. 82
Evaluating Intrusion Detection Systemsp. 85
Lincoln Labs Approachp. 86
Summaryp. 88
6 Detection of Exploitsp. 89
False Positivesp. 89
IMAP Exploitsp. 95
Exploit Ports with SYN/FIN Setp. 96
Scans to Apply Exploitsp. 99
Single Exploit, portmapp. 102
Summaryp. 109
7 Denial of Servicep. 111
Commonly Detected Denial-of-Service Tracesp. 111
Rarely Seen Well-Known Programsp. 120
Summaryp. 122
8 Intelligence Gathering Techniquesp. 123
Network and Host Mappingp. 124
NetBIOS Specific Tracesp. 133
Stealth Attacksp. 136
Summaryp. 139
9 Introduction to Hackingp. 141
Christmas Eve 1998p. 142
Where Attackers Shopp. 153
Communications Networkp. 155
Anonymityp. 158
Summaryp. 158
10 Coordinated Attacksp. 159
Coordinated Traceroutesp. 160
NetBIOS Deceptionp. 162
RESETs and More RESETsp. 163
SFRP Scansp. 169
Target-Based Analysisp. 170
Summaryp. 172
11 Additional Toolsp. 175
eNTraxp. 175
CMDS 4.0p. 180
Tripwirep. 181
Nmapp. 183
Summaryp. 192
12 Risk Management and Intrusion Detectionp. 193
Intrusion Detection in a Security Modelp. 193
Defining Riskp. 196
Riskp. 197
Defining the Threatp. 202
Risk Management Is Dollar Drivenp. 205
How Risky Is a Risk?p. 206
Summaryp. 207
13 Automated and Manual Responsep. 209
Automated Responsep. 210
Honeypotp. 213
Manual Responsep. 215
Summaryp. 222
14 Business Case for Intrusion Detectionp. 223
Part 1 Management Issuesp. 224
Part 2 Threats and Vulnerabilitiesp. 228
Part 3 Tradeoffs and Recommended Solutionsp. 232
Summaryp. 236
15 Future Directionsp. 237
Increasing Threatp. 238
Cyber Terrorism and Y2Kp. 242
Trusted Insiderp. 242
Improved Responsep. 244
The Virus Industry Revisitedp. 245
Hardware-Based IDp. 246
Defense in Depthp. 247
Program-Based IDp. 247
PDD63p. 248
Smart Auditorsp. 248
Summaryp. 249
Go to:Top of Page