Linux Firewalls : Attack Detection and Response.
Rash, Michael.
Linux Firewalls : Attack Detection and Response. - 1st ed. - 1 online resource (335 pages)
Intro -- BRIEF CONTENTS -- CONTENTS IN DETAIL -- ACKNOWLEDGMENTS -- FOREWORD -- INTRODUCTION -- CARE AND FEEDING OF IPTABLES -- NETWORK LAYER ATTACKS AND DEFENSE -- TRANSPORT LAYER ATTACKS AND DEFENSE -- APPLICATION LAYER ATTACKS AND DEFENSE -- INTRODUCING PSAD: THE PORT SCAN ATTACK DETECTOR -- PSAD OPERATIONS: DETECTING SUSPICIOUS TRAFFIC -- ADVANCED PSAD TOPICS: FROM SIGNATURE MATCHING TO OS FINGERPRINTING -- ACTIVE RESPONSE WITH PSAD -- TRANSLATING SNORT RULES INTO IPTABLES RULES -- DEPLOYING FWSNORT -- COMBINING PSAD AND FWSNORT -- PORT KNOCKING VS . SINGLE PACKET AUTHORIZATION -- INTRODUCING FWKNOP -- VISUALIZING IPTABLES LOGS -- ATTACK SPOOFING -- A COMPLETE FWSNORT SCRIPT -- INDEX.
9781593272289
Linux.
Computers -- Access control.
Firewalls (Computer security).
Electronic books.
QA76.9.A25 -- R36 2007eb
005.8
Linux Firewalls : Attack Detection and Response. - 1st ed. - 1 online resource (335 pages)
Intro -- BRIEF CONTENTS -- CONTENTS IN DETAIL -- ACKNOWLEDGMENTS -- FOREWORD -- INTRODUCTION -- CARE AND FEEDING OF IPTABLES -- NETWORK LAYER ATTACKS AND DEFENSE -- TRANSPORT LAYER ATTACKS AND DEFENSE -- APPLICATION LAYER ATTACKS AND DEFENSE -- INTRODUCING PSAD: THE PORT SCAN ATTACK DETECTOR -- PSAD OPERATIONS: DETECTING SUSPICIOUS TRAFFIC -- ADVANCED PSAD TOPICS: FROM SIGNATURE MATCHING TO OS FINGERPRINTING -- ACTIVE RESPONSE WITH PSAD -- TRANSLATING SNORT RULES INTO IPTABLES RULES -- DEPLOYING FWSNORT -- COMBINING PSAD AND FWSNORT -- PORT KNOCKING VS . SINGLE PACKET AUTHORIZATION -- INTRODUCING FWKNOP -- VISUALIZING IPTABLES LOGS -- ATTACK SPOOFING -- A COMPLETE FWSNORT SCRIPT -- INDEX.
9781593272289
Linux.
Computers -- Access control.
Firewalls (Computer security).
Electronic books.
QA76.9.A25 -- R36 2007eb
005.8