Tactics for attacking network security monitoring

This chapter from Richard Bejtlich's "The Tao of Network Security Monitoring: Beyond Intrusion Detection," outlines a collection of tactics intruders use to avoid being caught or at least caught in a timely manner.

Network security monitoring is the collection, analysis and escalation of indications and warnings to detect and respond to intrusions. In order to resist, identify and remove intruders from your customers' networks, it's important to understand how attackers can defy defensive methodologies. This chapter from Richard Bejtlich's The Tao of Network Security Monitoring: Beyond Intrusion Detection, outlines a collection of tactics intruders use to avoid being caught or at least caught in a timely manner. The general examples are augmented by specific technical examples. Readers who find this material interesting should let Richard Bejtlich know -- he plans to enhance these ideas in a future book.

Download Chapter 18, Tactics for attacking network security monitoring (PDF), from The Tao of Network Security Monitoring: Beyond Intrusion Detection written by Richard Bejtlich and published by Addison-Wesley Professional

The Tao of Network Security Monitoring: Beyond Intrusion Detection
By Bejtlich, Richard
Published by Addison-Wesley Professional
ISBN: 0321246772; Published: 7/14/2004; Copyright 2005; Pages: Final; Edition: 1


This was last published in September 2006

Dig Deeper on Network security products, technologies, services

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close