Table of Contents


protect your information with intrusion detection
Protect Your Information with Intrusion Detection
byAlex Lukatsky ISBN:1931769117
A-LIST Publishing 2003 (536 pages)

Answers on What, Where, and How to detect intrusion and what is necessary to build a system and make a network’s configuration effective, as well as how to react to attacks after they have been detected.

Table of Contents
Protect Your Information with Intrusion Detection
Introduction
Chapter 1 - Introduction to Intrusion Detection
Chapter 2 - Anatomy of an Attack
Chapter 3 - Introduction to Intrusion Detection
Chapter 4 - The Three Basic Principles of Intrusion Detection
Chapter 5 - Detecting Attack Traces
Chapter 6 - Classification of Intrusion Detection Systems
Chapter 7 - Anticipating Attacks, or Creating an Intrusion Detection Infrastructure
Chapter 8 - The Life Cycle, Deployment, and Implementation of an IDS
Chapter 9 - Selecting an Intrusion Detection System
Chapter 10 - Placement of the Intrusion Detection System
Chapter 11 - Using Intrusion Detection Systems
Chapter 12 - Common IDS Problems
Chapter 13 - Standardization in the Field of Intrusion Detection
Chapter 14 - Incident Response
Appendix A - List of Ports Frequently Used by Trojans
Appendix B - List of Most Frequently Scanned Ports
Appendix C - List of Internet Address Ranges
Appendix D - List of First-Level Domains
Appendix E - List of Protocol Identifiers for IPv4
Bibliography
Index
List of Figures
List of Tables
List of Code Examples
List of Sidebars


Protect Your Information with Intrusion Detection contains a detailed overview of the new technology in information protection--intrusion detection. This is a comprehensive handbook introducing the reader to the problem of intrusion detection, exploring the main concepts and principals of intrusion detection technology, and giving an in-depth classification of intrusion detection systems (IDS).In this book, often-unorganized information on ways of attacking is systematized, the criteria and signs that indicate an attack are covered, and information sources and analysis methods are also described.

This book is not a collection of after-action reports on a variety of network attacks. It describes the concepts and principals of intrusion detection technology. The main focus is a practical implementation of intrusion detection systems (IDS) and vulnerability analysis.

The author describes how to choose an IDS for various types of companies. The book also covers the implementation and technical support of an IDS. After reading this book, you will find answers on What, Where, and How to detect; what is necessary to build an intrusion detection system and make a network’s configuration effective; and how to react to attacks after they have been detected. The book is mainly intended for an audience of specialists/implementers who are responsible for the security of their organizations. This means, first of all, security administrators, as well as system and network administrators.

About the Author

Alex Lukatsky is a security administrator for Check Point Software Technologies and a certified instructor in security issues for the Internet Security Systems.