Problem solve Get help with specific problems with your technologies, process and projects.

Extrusion detection illustrated

This chapter will help you learn how to use extrusion detection to enhance your customer's awareness and security posture.

Extrusion detection is the process of identifing unauthorized activity by inspecting outbound network traffic. If a security consultant observes suspicious or malicious traffic leaving his customer's network, there's a strong possibility that internal systems are already compromised. During the last three years extrusion-centric processes and products have become popular. This chapter from Richard Bejtlich's Extrusion Detection: Security Monitoring for Internal Intrusions will help you learn how to use this powerful investigative technique to enhance your customer's awareness and security posture.

Download Chapter 3, Extrusion detection illustrated (PDF), from Extrusion Detection: Security Monitoring for Internal Intrusions written by Richard Bejtlich and published by Addison-Wesley Professional.

Extrusion Detection: Security Monitoring for Internal Intrusions
By Bejtlich, Richard
Published by Addison-Wesley Professional
ISBN: 0321349962; Published: 11/4/2005; Copyright 2006; Pages: Final; Edition: 1


This was last published in September 2006

Dig Deeper on Managed network security services

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close