Snort Cookbook: Solutions and Examples for Snort Administrators"O'Reilly Media, Inc.", 2005. gada 29. marts - 288 lappuses If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as:
|
No grāmatas satura
1.–5. rezultāts no 85.
... 212 6.5 Creating HTML Log Analysis Output 214 6.6 Tools for Testing Signatures 215 6.7 Analyzing and Graphing Logs 220 6.8 Analyzing Sniffed (Pcap) Traffic 223 6.9 Writing Output Plug-ins 224. 7. Miscellaneous. Other. Uses.
... creates a directory structure under the current directory. In this case, with the base directory ./snort-2.2.0/. Change into ... create the make file optimized for your architecture. There are a number of options that you can specify to ...
... Location window Figure 1-5. Installing window 10 | Chapter1: Installation and Optimization Figure 1-7. Successful Installation window The installation creates six subdirectories. This is the Title of the Book, eMatter Edition.
... creates six subdirectories within the root C:\Snort directory: bin, contrib, doc, etc, log, and rules. It also installs the Uninstall.exe file under the root C:\ Snort directory. The bin subdirectory contains the snort.exe executable ...
... create a bridge container: [root@frodo root]# brctl addbr snort_bridge Add the interfaces to the container: [root@frodo root]# brctl addif snort_bridge eth0 [root@frodo root]# brctl addif snort_bridge eth1 Then bring the bridge online ...
Saturs
1 | |
Logging Alerts and Output Plugins | 51 |
Rules and Signatures | 90 |
An Introduction | 125 |
Administrative Tools | 157 |
Log Analysis | 203 |
Miscellaneous Other Uses | 225 |
Index | 265 |