Text
Network intrusion detection
Table of Contents
I. TCP/IP.
1. IP Concepts.
2. Introduction to TCPdump and TCP.
3. Fragmentation.
4. ICMP.
5. Stimulus and Response.
6. DNS.
II. TRAFFIC ANALYSIS.
7. Packet Dissection Using TCPdump.
8. Examining IP Header Fields.
9. Examining Embedded Protocol Header Fields.
10. Real-World Analysis.
11. Mystery Traffic.
III. FILTERS/RULES FOR NETWORK MONITORING.
12. Writing TCPdump Filters.
13. Introduction to Snort and Snort Rules.
14. Snort Rules-Part II.
IV. INTRUSION INFRASTRUCTURE.
15. Mitnick Attack.
16. Architectural Issues.
17. Organizational Issues.
18. Automated and Manual Response.
19. Business Case for Intrusion Detection.
V. APPENDIXES.
Appendix A. Exploits and Scans to Apply Exploits.
Appendix B. Denial of Service.
No other version available