44%
The Practical Intrusion Detection Handbook

The Practical Intrusion Detection Handbook

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Intrusion detection systems are increasingly recognized as a key weapon in the war against computer crime. In The Practical Intrusion Detection Handbook, one of the field's leading experts shows exactly how to use them to detect, deter, and respond to security threats. This is the only intrusion detection book to present practical advice for the entire lifecycle: choosing products, planning, deployment, operations, and beyond. Full of checklists and real-world case studies, The Practical Intrusion Detection Handbook demonstrates exactly how to integrate intrusion detection into a total strategy for protecting your information and e-commerce assets. Paul E. Proctor introduces each approach to intrusion detection, including host-based, network-based, and hybrid solutions; then offers practical selection criteria; and reviews the key factors associated with successful deployment. You'll watch today's best intrusion detection systems in action, through response, surveillance, damage assessment, and data forensics. Finally, Proctor addresses the future of intrusion detection -- from standards and interoperability to law and ethics.

Table of Contents:
1. Introduction. Security versus Business. What Is Intrusion Detection? The Most Common Intrusion Detection. Network- vs. Host-based Intrusion Detection. Anatomy of an Intrusion Detection System. Command Console. Network Sensor. Alert Notification. Response Subsystem. Database. Network Tap. Anatomy of an Intrusion Detection Process. Traditional Audit versus Intrusion Detection. Integrity Checkers. A Conceptual View of Misuse Detection. Detecting Deviations from Acceptable Behavior. Detecting Adherence to Known Unacceptable Behavior. Summary. 2. A Historical Perspective. A Timeline. The Early Systems. Early Capabilities Comparison. Effectiveness. SSO Support/SSO Interface. Adaptability/Flexibility. Historical Lessons. Summary. 3. Network-Based Intrusion Detection Systems. Introduction. Network-based Detection. Unauthorized Access. Data/Resource Theft. Denial of Service. Architecture. Traditional Sensor-Based Architecture. Distributed Network-Node Architecture. The Network Intrusion Detection Engine. Network Signatures. Operational Concept. Tip-Off. Surveillance. Forensics Workbench. Benefits of Network-based Intrusion Detection. Outsider Deterrence. Detection. Automated Response and Notification. Challenges for Network-based Technologies. Packet Reassembly. High-Speed Networks. Sniffer Detection Programs. Switched Networks. Encryption. Summary. 4. Host-Based Intrusion Detection Systems. Introduction. Host-based Detection. Abuse of Privilege Attack Scenarios. Critical Data Access and Modification. Changes in Security Configuration. Architecture. Centralized Host-Based Architecture. Distributed Real-Time Architecture. Target Agent. Agentless Host-Based Intrusion Detection. Raw Data Archive. Operational Concept. Tip-Off. Surveillance. Damage Assessment. Compliance. Policy Management. Audit Policy. Detection Policy. Audit and Detection Policy Dependencies. Data Sources. Operating System Event Logs. Middleware Application Audit Sources. Application Audit Sources. Benefits of Host-based Intrusion Detection. Insider Deterrence. Detection. Notification and Response. Damage Assessment. Attack Anticipation. Prosecution Support. Behavioral Data Forensics. Challenges for Host-based Technologies. Performance. Deployment/Maintenance. Compromise. Spoofing. Summary. 5. Detection Technology and Techniques. Introduction. Network Detection Mechanisms. Packet Content Signatures. Packet Header (Traffic) Analysis. Host-based Signatures. Single Event Signatures. Multi-event Signatures. Multi-host Signatures. Enterprise Signatures. Compound (Network and Host) Signatures. Signature Detection Mechanisms. Embedded. Programmable. Expert System. Other Techniques. Statistical Analysis. Metalanguage. Artificial Intelligence (Artificial Neural Network). Summary. 6. Intrusion Detection Myths. Introduction. Myth 1: The Network Intrusion Detection Myth. The Network Intrusion Detection Revolution. Network Intrusion Detection Is Not Sufficient. What's the Difference Between Network- and Host-Based Detection? Comparing Host- and Network-Based Benefits. The Bottom Line. Myth 2: The False-Positive Myth. True/False Positive/Negative. Noisy Systems? There Is No Such Thing as a False-Positive. Bottom Line. Myth 3: The Automated Anomaly Detection Myth. Behavior Models. You Just Said There Are No False-Positives. The Training Problem (A Mini Myth). Anomaly Detection as Decision Support. Bottom Line. Myth 4: The Real-time Requirement Myth. Why Real-Time? The Costs of Real-Time. Real-Time versus In-Time. The Bottom Line. Myth 5: Inside the Firewall equals Insider Threat Detection. Insider Threats. Paradigm Shift. Bottom Line. Myth 6: The Automated Response Myth. Advertising. Automated Response = Risk. Characteristics of a Good Real-Time Automated Response. Bottom Line. Myth 7: The Artificial Intelligence Myth. New Attacks and AI. Root-Cause Analysis to Detect New Attacks. Bottom Line. Summary. 7. Effective Use. Detecting Outsider Misuse (Hackers). Real-Life Misuse Example 1: Anomalous Outbound Traffic. Real-Life Misuse Example 2: Help! We're Being Swept! Detecting Insider Misuse. Real-Life Misuse Example 3: Unauthorized Access to Mission-Critical Data. Real-Life Misuse Example 4: Abuse of Privilege. Attack Anticipation (Extended Attacks). Real-Life Misuse Example 5: Embezzlement. Real-Life Misuse Example 6: Intellectual Property Theft. Surveillance. Real-Life Misuse Example 7: Surveillance. Policy Compliance Monitoring. Real-Life Misuse Example 8: User Logout at Night. Damage Assessment. Real-life Misuse Example 9: Corporate Espionage. Summary. 8. Behavioral Data Forensics in Intrusion Detection. Introduction. Benefits of Behavioral Data Forensics. Data Mining. Forms and Formats. Data Volume. User-Centric versus Target-Centric Monitoring. Real-World Examples of Behavioral Data Forensics. Performance Improvement. Security. Workload Reduction. Security Policy. Data Mining Techniques. Data Presentation Refinement. Contextual Interpretation. Drill Down. Combining Data from Heterogeneous Sources. Combining Data from All-Band Resources. Behavioral data forensics Tutorial Examples. Example 1: Trending and Drill Down. Example 2: Target Browsing. Example 3: Critical File Browsing Trends. Example 4: Attack Anticipation (Tip-Off). Example 5: Target Overloaded. Other Examples. Summary. 9. Operational Use. Introduction. Background Operation. On-demand Operation. Scheduled Operation. Real-time Operation. 2437 Monitoring. Incident Response. Escalation Procedures. Incident Triage. Incident Volume. Summary. 10. Intrusion Detection Project Lifecycle. Introduction. Project Phases. Overlap. Resource Estimates. Calculating Total Cost of Ownership. Hidden Costs of Intrusion Detection. Project Planning/requirements Analysis. Acquisition. Pilot Phase. Deployment Phase. Policy Implementation. Promiscuous Network Sensor Deployments. Distributed Sensor Deployments. Tuning. Deployment Issues. Cultural. Legal. Politics. Target Ownership. Policy Management. Maintenance. Software Updates. Signature Updates. Summary. 11. Justifying Intrusion Detection. Importance of Intrusion Detection in Security. Time-Based Security. Relaxing Access Controls. Threat Briefing. 1. CSI/FBI Study. A Recap of Misuse Examples. Insider Threats. Quantifying Risk. Problems with Quantitative Risk Assessment. Return on Investment. ROI and Risk Calculator. Behind the Scenes. Summary. 12. Requirements Definition. Introduction. Tracking Nonrequirements. Developing a Requirements Document. What Are Your Goals For Intrusion Detection? Information Risk Management. Detection Requirements. Perimeter Threat Detection Requirements. Insider Threat Detection requirements. Compliance Monitoring Requirements. Response Requirements. Resource Classification. Using Intrusion Detection to Define Mission-Critical Data. Operations Requirements. Background Operations. On-Demand Operation. Scheduled Operation. Real-Time Operation. 24. ´ 7 Monitoring. Platform Coverage Requirements. Audit Source Requirements. Performance Requirements. Intrusion Detection System Performance. Network Resource Requirements. Scalability Requirements. Prosecution Requirements. Damage Assessment Requirements. Summary. 13. Tool Selection and Acquisition Process. Introduction. Selection and Evaluation Process. Define Requirements. Conduct Research. Online Research. Conferences. Magazines. Request for Information. Establish Selection Criteria. Translate Environment-Specific Criteria. Criteria Weighting. Scoring. Evaluation. Conduct Evaluation. Request for Proposal. Cover Letter. RFP Example. Pilot Program. Speaking to References. Words of Wisdom. Summary. 14. Commercial Intrusion Detection Tools. Introduction. Network (TCP/IP) Only. BlackICE/ICEcap—Network ICE. Dragon—Network Security Wizards. NFR ID Appliance—Network Flight Recorder. Secure Intrusion Detection System (NetRanger)—Cisco. Net Prowler—Axent. eTrust ID (Abirnet Sessionwall 23)— Computer Associates. Host-only Products. Computer Misuse Detection System (CMDS)—ODS Networks. Kane Security Monitor (KSM)—ODS Networks, Inc. SecureCom 8001 Internet Appliance (Hardware)— ODS Networks, Inc.? Intruder Alert (ITA)—Axent. PS Audit—Pentasafe. Operations Manager—Mission Critical. Hybrid Systems. Centrax—CyberSafe Corporation. Cyber Cop Monitor—Network Associates, Inc. RealSecure—Internet Security Systems. Summary. 15. Legal Issues. Introduction. Law Enforcement/Criminal Prosecutions. Tort Litigation. Negligence Litigation. Better Technology. Y2K. Corporate Reluctance to Prosecute. Standard of Due Care. Responsibilities. One-Sided Liability. Evidentiary Issues. Rules of Evidence. Accuracy. Chain of Custody. Transparency. Case Study. Improving Evidentiary Veracity. Organizations. National White Collar Crime Center. National Cybercrime Training Partnership (NCTP). High Technology Crime Investigators Association (HTCIA). Summary. 16. Organizations, Standards, and Government Initiatives. Introduction. Organizations. ICSA.net. SANS. Standards Bodies (Interoperability). What Should Be Standardized? Interoperability. Common Intrusion Detection Framework (CIDF). IETF Intrusion Detection Working Group (IDWG). Common Vulnerability and Exposures (CVE). U.S. Federal Government Initiatives. The National Security Telecommunications Advisory Committee (NSTAC). The Presidential Commission on Critical Infrastructure Protection (PCCIP). Presidential Decision Directive 63 (PDD-63). Summary. 17. Practical Intrusion Detection. The Current State of Technology. The Future of Intrusion Detection. Network Intrusion Detection. Host-Based Intrusion Detection. Managed Services. Enterprise On-Demand Detection. Application Intrusion Detection. Standards for Interoperability. Prosecution Support. Real-Time versus In Time. Advice to Security Officers. Advice to Intrusion Detection Developers. My last Advice: Avoiding Confusion. Summary. After All. Appendix A: Sample RFP. Appendix B: Commercial Intrusion Detection Vendors. Appendix C: Resources. Index.


Best Sellers


Product Details
  • ISBN-13: 9780130259608
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Prentice Hall
  • Edition: 1
  • Language: English
  • Returnable: Y
  • Spine Width: 31 mm
  • Width: 242 mm
  • ISBN-10: 0130259608
  • Publisher Date: 17 Aug 2000
  • Binding: Hardback
  • Height: 183 mm
  • No of Pages: 384
  • Series Title: English
  • Weight: 576 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
The Practical Intrusion Detection Handbook
Pearson Education (US) -
The Practical Intrusion Detection Handbook
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

The Practical Intrusion Detection Handbook

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA