Tactics for attacking network security monitoring

This chapter from Richard Bejtlich's "The Tao of Network Security Monitoring: Beyond Intrusion Detection," outlines a collection of tactics intruders use to avoid being caught or at least caught in a timely manner.

Network security monitoring is the collection, analysis and escalation of indications and warnings to detect and respond to intrusions. In order to resist, identify and remove intruders from your customers' networks, it's important to understand how attackers can defy defensive methodologies. This chapter from Richard Bejtlich's The Tao of Network Security Monitoring: Beyond Intrusion Detection, outlines a collection of tactics intruders use to avoid being caught or at least caught in a timely manner. The general examples are augmented by specific technical examples. Readers who find this material interesting should let Richard Bejtlich know -- he plans to enhance these ideas in a future book.

Download Chapter 18, Tactics for attacking network security monitoring (PDF), from The Tao of Network Security Monitoring: Beyond Intrusion Detection written by Richard Bejtlich and published by Addison-Wesley Professional

The Tao of Network Security Monitoring: Beyond Intrusion Detection
By Bejtlich, Richard
Published by Addison-Wesley Professional
ISBN: 0321246772; Published: 7/14/2004; Copyright 2005; Pages: Final; Edition: 1


This was first published in September 2006

Dig deeper on Network security products, technologies, services

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close