Extrusion detection is the process of identifing unauthorized activity by inspecting outbound network traffic. If a security consultant observes suspicious or malicious traffic leaving his customer's network, there's a strong possibility that internal systems are already compromised. During the last three years extrusion-centric processes and products have become popular. This chapter from Richard Bejtlich's
Extrusion Detection: Security Monitoring for Internal Intrusions will help you learn how to use this powerful investigative technique to enhance your customer's awareness and security posture.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Download Chapter 3, Extrusion detection illustrated (PDF), from Extrusion Detection: Security Monitoring for Internal Intrusions written by Richard Bejtlich and published by Addison-Wesley Professional.
Extrusion Detection: Security Monitoring for Internal Intrusions
By Bejtlich, Richard
Published by Addison-Wesley Professional
ISBN: 0321349962; Published: 11/4/2005; Copyright 2006; Pages: Final; Edition: 1