Description

Book Synopsis
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them.

Table of Contents
Preface 1. Introduction Disappearing Perimeters Defense-in-Depth Detecting Intrusions (a Hierarchy of Approaches) What Is NIDS (and What Is an Intrusion)? The Challenges of Network Intrusion Detection Why Snort as an NIDS? Sites of Interest 2. Network Traffic Analysis The TCP/IP Suite of Protocols Dissecting a Network Packet Packet Sniffing Installing tcpdump tcpdump Basics Examining tcpdump Output Running tcpdump ethereal Sites of Interest 3. Installing Snort About Snort Installing Snort Command-Line Options Modes of Operation 4. Know Your Enemy The Bad Guys Anatomy of an Attack: The Five Ps Denial-of-Service IDS Evasion Sites of Interest 5. The snort.conf File Network and Configuration Variables Snort Decoder and Detection Engine Configuration Preprocessor Configurations Output Configurations File Inclusions 6. Deploying Snort Deploy NIDS with Your Eyes Open Initial Configuration Sensor Placement Securing the Sensor Itself Using Snort More Effectively Site of Interest 7. Creating and Managing Snort Rules Downloading the Rules The Rule Sets Creating Your Own Rules Rule Execution Keeping Things Up-to-Date Interesting Sites 8. Intrusion Prevention Intrusion Prevention Strategies IPS Deployment Risks Flexible Response with Snort The Snort Inline Patch Controlling Your Border Sites of Interest 9. Tuning and Thresholding False Positives (False Alarms) False Negatives (Missed Alerts) Initial Configuration and Tuning Pass Rules Thresholding and Suppression 10. Using ACID as a Snort IDS Management Console Software Installation and Configuration ACID Console Installation Accessing the ACID Console Analyzing the Captured Data Sites of Interest 11. Using SnortCenter as a Snort IDS Management Console SnortCenter Console Installation SnortCenter Agent Installation SnortCenter Management Console Logging In and Surveying the Layout Adding Sensors to the Console Managing Tasks 12. Additional Tools for Snort IDS Management Open Source Solutions Commercial Solutions 13. Strategies for High-Bandwidth Implementations of Snort Barnyard (and Sguil) Commericial IDS Load Balancers The IDS Distribution System (I(DS)2) A. Snort and ACID Database Schema B. The Default snort.conf File C. Resources Index

Managing Security with Snort and IDS Tools

Product form

£23.99

Includes FREE delivery

RRP £31.99 – you save £8.00 (25%)

Order before 4pm today for delivery by Thu 15 Jan 2026.

A Paperback / softback by Kerry J Cox, Christopher Gerg

Out of stock


    View other formats and editions of Managing Security with Snort and IDS Tools by Kerry J Cox

    Publisher: O'Reilly Media
    Publication Date: 07/09/2004
    ISBN13: 9780596006617, 978-0596006617
    ISBN10: 0596006616
    Also in:
    Data encryption

    Description

    Book Synopsis
    This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them.

    Table of Contents
    Preface 1. Introduction Disappearing Perimeters Defense-in-Depth Detecting Intrusions (a Hierarchy of Approaches) What Is NIDS (and What Is an Intrusion)? The Challenges of Network Intrusion Detection Why Snort as an NIDS? Sites of Interest 2. Network Traffic Analysis The TCP/IP Suite of Protocols Dissecting a Network Packet Packet Sniffing Installing tcpdump tcpdump Basics Examining tcpdump Output Running tcpdump ethereal Sites of Interest 3. Installing Snort About Snort Installing Snort Command-Line Options Modes of Operation 4. Know Your Enemy The Bad Guys Anatomy of an Attack: The Five Ps Denial-of-Service IDS Evasion Sites of Interest 5. The snort.conf File Network and Configuration Variables Snort Decoder and Detection Engine Configuration Preprocessor Configurations Output Configurations File Inclusions 6. Deploying Snort Deploy NIDS with Your Eyes Open Initial Configuration Sensor Placement Securing the Sensor Itself Using Snort More Effectively Site of Interest 7. Creating and Managing Snort Rules Downloading the Rules The Rule Sets Creating Your Own Rules Rule Execution Keeping Things Up-to-Date Interesting Sites 8. Intrusion Prevention Intrusion Prevention Strategies IPS Deployment Risks Flexible Response with Snort The Snort Inline Patch Controlling Your Border Sites of Interest 9. Tuning and Thresholding False Positives (False Alarms) False Negatives (Missed Alerts) Initial Configuration and Tuning Pass Rules Thresholding and Suppression 10. Using ACID as a Snort IDS Management Console Software Installation and Configuration ACID Console Installation Accessing the ACID Console Analyzing the Captured Data Sites of Interest 11. Using SnortCenter as a Snort IDS Management Console SnortCenter Console Installation SnortCenter Agent Installation SnortCenter Management Console Logging In and Surveying the Layout Adding Sensors to the Console Managing Tasks 12. Additional Tools for Snort IDS Management Open Source Solutions Commercial Solutions 13. Strategies for High-Bandwidth Implementations of Snort Barnyard (and Sguil) Commericial IDS Load Balancers The IDS Distribution System (I(DS)2) A. Snort and ACID Database Schema B. The Default snort.conf File C. Resources Index

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account