Intrusion Prevention And Active Response: Deploying Network And Host Ips
Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin
- 出版商: Syngress Media
- 出版日期: 2005-04-12
- 定價: $1,650
- 售價: 5.0 折 $825
- 語言: 英文
- 頁數: 424
- 裝訂: Paperback
- ISBN: 193226647X
- ISBN-13: 9781932266474
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute
Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercial and open source intrusion prevention solutions. This is the first book-length work that specifically concentrates on the concept, implementation, and implications of intrusion prevention and active response. The term IPS has been thrown around with reckless abandon by the security community. Here, the author team works to establish a common understanding and terminology, as well as compare the approaches to intrusion prevention.
· Transition from Intrusion Detection to Intrusion Prevention
Unlike IDS, IPS can modify application-layer data or perform system call interception.
· Develop an Effective Packet Inspection Toolbox
Use products such as the Metasploit Framework as a source of test attacks.
· Travel Inside the SANS Internet Storm Center
Review packet captures of actual attacks, like the “Witty” worm, directly from the handler’s diary.
· Protect Against False Positives
Remember that, unlike an IDS, an IPS will REACT to an intrusion.
· Integrate Multiple Layers of IPS
Create a multivendor defense at the Data Link, Network, Transport, and Application layers.
· Deploy Host Attack Prevention Mechanisms
Includes stack hardening, system call interception, and application shimming.
· Implement Inline Packet Payload Alteration
Use Snort Inline or a Linux kernel patch to the Netfilter string match extension.
· Covers all Major Intrusion Prevention and Active Response Systems
Includes Snort Inline, SnortSAM, PaX, StackGuard, LIDS, FWSnort, PSAD, Enterasys Web IPS, and mod_securit.
· Deploy IPS on Web Servers at the Applications Layer
The loading of an application-level IPS in process by the Web server will protect the server and inspect encrypted traffic.
Table of Contents:
Foreword by Stephen Northcutt
Intrusion Prevention and Active Response
Packet Inspection for Intrusion Analysis
False Positives and Real Damage
Four Layers of IPS Actions
Network Inline Data Modification
Protecting Your Host Through the Operating System
IPS at the Application Layer
Deploying Open Source IPS Solutions
IPS Evasion Techniques
Your Solutions Membership Gives You Access to:
A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page
“From the Author” Forum where the authors post timely updates and links to related sites
The complete code listings from the book
Downloadable chapters from these best-selling books:
Microsoft Log Parser Toolkit
Aggressive Network Self-Defense
Black Hat Physical Device Security
Buffer Overflow Attacks: Detect, Exploit, Prevent