Extrusion detection is the process of identifing unauthorized activity by inspecting outbound network traffic. If a security consultant observes suspicious or malicious traffic leaving his customer's network, there's a strong possibility that internal systems are already compromised. During the last three years extrusion-centric processes and products have become popular. This chapter from Richard Bejtlich's
Extrusion Detection: Security Monitoring for Internal Intrusions will help you learn how to use this powerful investigative technique to enhance your customer's awareness and security posture.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Download Chapter 3, Extrusion detection illustrated (PDF), from Extrusion Detection: Security Monitoring for Internal Intrusions written by Richard Bejtlich and published by Addison-Wesley Professional.
Extrusion Detection: Security Monitoring for Internal Intrusions
By Bejtlich, Richard
Published by Addison-Wesley Professional
ISBN: 0321349962; Published: 11/4/2005; Copyright 2006; Pages: Final; Edition: 1