Network security monitoring is the collection, analysis and escalation of indications and warnings to detect and respond to intrusions. In order to resist, identify and remove intruders from your customers' networks, it's important to understand how attackers can defy defensive methodologies. This chapter from Richard Bejtlich's
The Tao of Network Security Monitoring: Beyond Intrusion Detection, outlines a collection of tactics intruders use to avoid being caught or at least caught in a timely manner. The general examples are augmented by specific technical examples. Readers who find this material interesting should let
Richard Bejtlich know -- he plans to enhance these ideas in a future book.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Download Chapter 18, Tactics for attacking network security monitoring (PDF), from The Tao of Network Security Monitoring: Beyond Intrusion Detection written by Richard Bejtlich and published by Addison-Wesley Professional
The Tao of Network Security Monitoring: Beyond Intrusion Detection
By Bejtlich, Richard
Published by Addison-Wesley Professional
ISBN: 0321246772; Published: 7/14/2004; Copyright 2005; Pages: Final; Edition: 1