Skip to:Content
|
Bottom
Cover image for Intrusion signatures and analysis
Title:
Intrusion signatures and analysis
Publication Information:
Indianapolis, Ind. : New Riders, 2001
ISBN:
9780735710634
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010061243 QA76.9.A25 I67 2001 Open Access Book Book
Searching...

On Order

Summary

Summary

Intrusion Detection is a red hot topic in today's security field. We hear stories of compromised or rendered unusable by network attack daily. The majority of the analysts today are not trained to do their work, and often have to learn on their own. This book empowers the reader to analyze and interpret the traces that they are seeing. This book contains information for the "well seasoned" senior intrusion analyst.


Author Notes

Stephen Northcutt is the author of several books including: Incident Handling Step-by-Step, Intrusion Detection: Shadow Style (both by the SANS Institute) and Network Intrusion Detection: An Analyst's Handbook (New Riders) as well as a contributing editor for Securing NT Step-by-Step (The SANS Institute.) He was the original developer of the Shadow intrusion detection system and served as the leader of the Department of Defenses Shadow Intrusion Detection Team for two years. Mr. Northcutt was the Chief for Information Warfare at the Ballistic Missile Defense Organization and currently serves as the Director for GIAC Training and Certification for the SANS Institute. Mark Cooper graduated from UMIST in 1991 with a BS in Microelectronic Systems Engineering. Currently working as a security consultant, he reached his current position after spending many years as a software engineer and then as a UNIX Systems Administrator. He is now a SANS GIAC Certified Intrusion Analyst. Matt Fearnow is a Network/ Security Administrator for Macmillan USA. Before working at Macmillan, he served in the US Navy as a Sonar Technician aboard submarines. In his current duties he constantly utilizes his SANS GIAC certification and is a frequent contributor to the SANS GIAC website. Matt was the first to establish categories for the traces from completed GIAC practicals. Karen Frederick is an Infosec Engineer for Sun Tzu Security in Milwaukee, Wisconsin. She earned her bachelor's degree in computer science from the University of Wisconsin-Parkside, and she is currently completing her master's degree thesis in intrusion detection from the University of Idaho's Engineering Outreach program. Karen holds several certifications, including Microsoft Certified Systems Engineer + Internet, Check Point Certified Security Administrator and GIAC Certified Intrusion Analyst.


Table of Contents

1 Reading Log Formats
2 Introduction to the Practicals
3 The Ten Most Critical Internet Security Threats, Part 1
4 The Ten Most Critical Internet Security Threats, Part 2
5 Reactions and Responses
6 Perimeter Logs
7 Non-Malicious Traffic
8 Network Mapping
9 Scans that Probe Systems for Information
10 Denial of Service (DoS)-Resource Starvation
11 Denial of Service (DoS)-Bandwidth Consumption
12 Trojans
13 Exploits
14 Buffer Overflows with Content
15 Fragmentation
16 False Positives
17 Out of Spec Packets
Go to:Top of Page