Extrusion detection illustrated

This chapter will help you learn how to use extrusion detection to enhance your customer's awareness and security posture.

Extrusion detection is the process of identifing unauthorized activity by inspecting outbound network traffic. If a security consultant observes suspicious or malicious traffic leaving his customer's network, there's a strong possibility that internal systems are already compromised. During the last three years extrusion-centric processes and products have become popular. This chapter from Richard Bejtlich's Extrusion Detection: Security Monitoring for Internal Intrusions will help you learn how to use this powerful investigative technique to enhance your customer's awareness and security posture.

Download Chapter 3, Extrusion detection illustrated (PDF), from Extrusion Detection: Security Monitoring for Internal Intrusions written by Richard Bejtlich and published by Addison-Wesley Professional.

Extrusion Detection: Security Monitoring for Internal Intrusions
By Bejtlich, Richard
Published by Addison-Wesley Professional
ISBN: 0321349962; Published: 11/4/2005; Copyright 2006; Pages: Final; Edition: 1


This was first published in September 2006

Dig deeper on Network security products, technologies, services

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close