Intrusion Signatures and Analysis
Directed at computer network intrusion analysts, this handbook focuses on providing examples of traces that analysts are most likely to see and presenting analyses of those traces. After presenting some of the most critical Internet security threats, chapters cover non-malicious traffic, perimeter logs, reactions and responses, network mapping, scans that probe systems for information, denial of service through resource starvation, denial of service through bandwidth consumption, Trojans, exploits, buffer overflows with content, fragmentation, false positives, and out-of-spec packets. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More
Intrusion Detection is a red hot topic in today's security field. We hear stories of compromised or rendered unusable by network attack daily. The majority of the analysts today are not trained to do their work, and often have to learn on their own. This book empowers the reader to analyze and interpret the traces that they are seeing. This book contains information for the "well seasoned" senior intrusion analyst. Intrusion Detection is a red-hot topic in today's technology and security field. You hear daily stories of networks compromised or rendered unusable by attack. The cyber-criminals behind this must be stopped. The majority of the security analysts working today are not properly trained to do their important work, and often have to learn on the job or on their own. This book empowers the security specialist to analyze and interpret the traces that they are seeing, find their source, and stop the intrusion. This book also contains must-have information for the experienced intrusion analyst.
Read Less