Skip to:Content
|
Bottom
Cover image for Network intrusion detection
Title:
Network intrusion detection
Personal Author:
Edition:
3rd ed.
Publication Information:
Indianapolis, Ind. : New Riders, 2003
ISBN:
9780735712652
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010061316 TK5105.59 N673 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters.


Author Notes

About the Authors

Stephen Northcutt is a graduate of Mary Washington College. Beforeentering the field of computer security, he worked as a Navy helicopter searchand rescue crewman, white water raft guide, chef, martial arts instructor,cartographer, and network designer. Stephen is author/co-author of IncidentHandling Step by Step, Intrusion Signatures and Analysis, Inside NetworkPerimeter Security, and the previous two editions of this book. He was theoriginal author of the Shadow intrusion detection system and leader of theDepartment of Defense's Shadow Intrusion Detection team before acceptingthe position of Chief for Information Warfare at the Ballistic Missile DefenseOrganization. Stephen currently serves as Director of Training and Certificationfor the SANS Institute.

Judy Novak is currently a senior security analyst working for theBaltimore-based consulting firm of Jacob and Sundstrom, Inc. She primarily worksat the Johns Hopkins University Applied Physics Laboratory where she is involvedin intrusion detection and traffic monitoring and Information Operationsresearch. Judy was one of the founding members of the Army Research LabsComputer Incident Response Team where she worked for three years. She hascontributed to the development of a SANS course in TCP/IP and written a SANShands-on course, "Network Traffic Analysis Using tcpdump," both ofwhich are used in SANS certifications tracks. Judy is a graduate of theUniversity of Maryland--home of the 2002 NCAA basketball champions. She isan aging, yet still passionate, bicyclist, and Lance Armstrong is her modern-dayhero!


© Copyright Pearson Education. All rights reserved.


Excerpts

Excerpts

Introduction Our goal in writing Network Intrusion Detection, Third Edition has been toempower you as an analyst. We believe that if you read this book cover to cover,and put the material into practice as you go, you will be ready to enter theworld of intrusion analysis. Many people have read our books, or attended ourlive class offered by SANS, and the lights have gone on; then, they are off tothe races. We will cover the technical material, the workings of TCP/IP, andalso make every effort to help you understand how an analyst thinks throughdozens of examples. Network Intrusion Detection, Third Edition is offered in five parts. Part I,"TCP/IP," begins with Chapter 1, ranging from an introduction to thefundamental concepts of the Internet protocol to a discussion of RemoteProcedure Calls (RPCs). We realize that it has become stylish to begin a booksaying a few words about TCP/IP, but the system Judy and I have developed hasnot only taught more people IP but a lot more about IP as well--more thanany other system ever developed. We call it "real TCP" because thematerial is based on how packets actually perform on the network, not theory.Even if you are familiar with IP, give the first part of the book a look. We areconfident you will be pleasantly surprised. Perhaps the most important chapterin Part I is Chapter 5, "Stimulus and Response." Whenever you look ata network trace, the first thing you need to determine is if it is a stimulus ora response. This helps you to properly analyze the traffic. Please take the timeto make sure you master this material; it will prevent analysis errors as youmove forward. Tip Whenever you look at a network trace, thefirst thing you need to determine is if it is a stimulus or a response. The book continues in Part II, "Traffic Analysis" with a discussionof traffic analysis. By this, we mean analyzing the network traffic byconsideration of the header fields of the IP and higher protocol fields.Although ASCII and hex signatures are a critical part of intrusion detection,they are only tools in the analyst's tool belt. Also in Part II, we beginto show you the importance of each field, how they are rich treasures tounderstanding. Every field has meaning, and fields provide information bothabout the sender of the packet and its intended purpose. As this part of thebook comes to a close, we tell you stories from the perspective of an analystseeing network patterns for the first time. The goal is to help you prepare forthe day when you will face an unknown pattern. Although there are times a network pattern is so obvious it almost screamsits message, more often you have to search for events of interest. Sometimes,you can do this with a well-known signature, but equally often, you must searchfor it. Whenever attackers write software for denial of service, or exploits,the software tends to leave a signature that is the result of crafting thepacket. This is similar to the way that a bullet bears the marks of the barrelof the gun that fired it, and experts can positively identify the gun by thebullet. In Part III of the book, "Filters/Rules for NetworkMonitoring" we build the skills to examine any field in the packet and theknowledge to determine what is normal and what is anomalous. In this section, wepractice these skills both with TCPdump and also Snort. In Part IV, we consider the larger framework of intrusion detection. Wediscuss where you should place sensors, what a console needs to support for dataanalysis, and automated and manual response issues to intrusion detection. Inaddition, this section helps arm the analyst with information about how theintrusion detection capability fits in with the business model of theorganization. Finally, this book provides three appendixes that reference common signaturesof well-known reconnaissance, denial of service, and exploit scans. We believeyou will find this to be no fluff, packed with data from the first to the lastpage. Network Intrusion Detection, Third Edition has not been developed byprofessional technical writers. Judy and I have been working as analysts since1996 and have faced a number of new patterns. We are thankful for thisopportunity to share our experiences and insights with you and hope this bookwill be of service to you in your journey as an intrusion analyst. (c) Copyright Pearson Education. All rights reserved. Excerpted from Network Intrusion Detection: An Analyst's Handbook by Stephen Northcutt, Judy Novak All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.

Table of Contents

I TCP/IP
1 Ip Conceptsp. 3
The TCP/IP Internet Modelp. 4
Packaging (Beyond Paper or Plastic)p. 7
Addressesp. 11
Service Portsp. 15
IP Protocolsp. 16
Domain Name Systemp. 18
Routing: How You Get There from Herep. 19
Summaryp. 20
2 Introduction to TCPdump and TCPp. 23
TCPdumpp. 24
Introduction to TCPp. 31
TCP Gone Awryp. 38
Summaryp. 42
3 Fragmentationp. 43
Theory of Fragmentationp. 44
Malicious Fragmentationp. 53
Summaryp. 56
4 ICMPp. 57
ICMP Theoryp. 58
Mapping Techniquesp. 61
Normal ICMP Activityp. 65
Malicious ICMP Activityp. 69
To Block or Not to Blockp. 76
Summaryp. 78
5 Stimulus and Responsep. 79
The Expectedp. 81
Protocol Bendersp. 88
Abnormal Stimulip. 92
Summaryp. 101
6 DNSp. 103
Back to Basics: DNS Theoryp. 104
Using DNS for Reconnaissancep. 115
Tainting DNS Responsesp. 119
Summaryp. 122
II Traffic Analysis
7 Packet Dissection Using TCPdumpp. 125
Why Learn to Do Packet Dissection?p. 127
Sidestep DNS Queriesp. 129
Introduction to Packet Dissection Using TCPdumpp. 131
Where Does the IP Stop and the Embedded Protocol Begin?p. 133
Other Length Fieldsp. 133
Increasing the Snaplenp. 135
Dissecting the Whole Packetp. 137
Freeware Tools for Packet Dissectionp. 139
Summaryp. 142
8 Examining IP Header Fieldsp. 143
Insertion and Evasion Attacksp. 143
IP Header Fieldsp. 147
The More Fragments (MF) Flagp. 151
Summaryp. 159
9 Examining Embedded Protocol Header Fieldsp. 161
TCPp. 161
UDPp. 178
ICMPp. 181
Summaryp. 183
10 Real-World Analysisp. 185
You've Been Hacked!p. 186
Netbus Scanp. 189
How Slow Can you Go?p. 194
RingZero Wormp. 197
Summaryp. 200
11 Mystery Trafficp. 203
The Event in a Nutshellp. 204
The Trafficp. 204
DDoS or Scanp. 205
Fingerprinting Participant Hostsp. 210
Summaryp. 218
III Filters/Rules for Network Monitoring
12 Writing TCPdump Filtersp. 221
The Mechanics of Writing TCPdump Filtersp. 222
Bit Maskingp. 224
TCPdump IP Filtersp. 227
TCPdump UDP Filtersp. 229
TCPdump TCP Filtersp. 231
Summaryp. 236
13 Introduction to Snort and Snort Rulesp. 237
An Overview of Running Snortp. 238
Snort Rulesp. 240
Summaryp. 248
14 Snort Rules--Part IIp. 249
Format of Snort Optionsp. 250
Rule Optionsp. 250
Putting It All Togetherp. 266
Summaryp. 269
IV Intrusion Infrastructure
15 Mitnick Attackp. 273
Exploiting TCPp. 274
Detecting the Mitnick Attackp. 285
Network-Based Intrusion-Detection Systemsp. 286
Host-Based Intrusion-Detection Systemsp. 288
Preventing the Mitnick Attackp. 289
Summaryp. 290
16 Architectural Issuesp. 291
Events of Interestp. 292
Limits to Observationp. 294
Low-Hanging Fruit Paradigmp. 296
Human Factors Limit Detectsp. 298
Severityp. 300
Countermeasuresp. 303
Calculating Severityp. 304
Sensor Placementp. 307
Outside Firewallp. 308
Push/Pullp. 311
Analyst Consolep. 312
Host- or Network-Based Intrusion Detectionp. 316
Summaryp. 318
17 Organizational Issuesp. 319
Organizational Security Modelp. 320
Defining Riskp. 324
Riskp. 326
Defining the Threatp. 332
Risk Management Is Dollar Drivenp. 336
How Risky Is a Risk?p. 336
Summaryp. 338
18 Automated and Manual Responsep. 339
Automated Responsep. 341
Honeypotp. 347
Manual Responsep. 349
Summaryp. 358
19 Business Case for Intrusion Detectionp. 359
Part 1 Management Issuesp. 361
Part 2 Threats and Vulnerabilitiesp. 367
Part 3 Tradeoffs and Recommended Solutionp. 372
Repeat the Executive Summaryp. 377
Summaryp. 378
20 Future Directionsp. 379
Increasing Threatp. 379
Defending Against the Threatp. 383
Defense in Depthp. 388
Emerging Techniquesp. 392
Summaryp. 396
V Appendixes
A Exploits and Scans to Apply Exploitsp. 401
False Positivesp. 401
IMAP Exploitsp. 409
Scans to Apply Exploitsp. 413
Single Exploit, Portmapp. 417
Summaryp. 423
B Denial of Servicep. 425
Brute-Force Denial-of-Service Tracesp. 426
Elegant Killsp. 430
nmapp. 433
Distributed Denial-of-Service Attacksp. 435
Summaryp. 438
Ctection of Intelligence Gatheringp. 439
Network and Host Mappingp. 440
NetBIOS-Specific Tracesp. 450
Stealth Attacksp. 452
Measuring Response Timep. 457
Worms as Information Gatherersp. 460
Summaryp. 464
Indexp. 465
Go to:Top of Page