Network security monitoring is the collection, analysis and escalation of indications and warnings to detect and respond to intrusions. In order to resist, identify and remove intruders from your customers' networks, it's important to understand how attackers can defy defensive methodologies. This chapter from Richard Bejtlich's
The Tao of Network Security Monitoring: Beyond Intrusion Detection, outlines a collection of tactics intruders use to avoid being caught or at least caught in a timely manner. The general examples are augmented by specific technical examples. Readers who find this material interesting should let
Richard Bejtlich know -- he plans to enhance these ideas in a future book.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Download Chapter 18, Tactics for attacking network security monitoring (PDF), from The Tao of Network Security Monitoring: Beyond Intrusion Detection written by Richard Bejtlich and published by Addison-Wesley Professional
The Tao of Network Security Monitoring: Beyond Intrusion Detection
By Bejtlich, Richard
Published by Addison-Wesley Professional
ISBN: 0321246772; Published: 7/14/2004; Copyright 2005; Pages: Final; Edition: 1