Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

Buy
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs

    Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises.

    About the Author
    Michael Rash is a Security Architect on the Dragon Intrusion Detection System with Enterasys Networks, Inc., and is a frequent contributor to open source projects. As the creator of psad, fwknop, and fwsnort, Rash is an expert on firewalls, IDSs, OS fingerprinting, and the Snort rules language. He is co-author of the book Snort 2.1 Intrusion Detection,lead-author and technical editor of the book Intrusion Prevention and Active Response, and has written security articles for Linux Journal, SysAdmin, and ;login:.

  • (HTML tags aren't allowed.)

    Mission-Critical Microsoft Exchange 2003 : Designing and Building Reliable Exchange Servers
    Mission-Critical Microsoft Exchange 2003 : Designing and Building Reliable Exchange Servers

    Mission-Critical Microsoft Exchange 2003 provides a complete update of Cochran’s Mission-Critical Microsoft Exchange 2000, and complements Tony Redmond’s new book, the best-selling Microsoft Exchange Server 2003. This book includes many of the same high-availability topics as the first edition but also...

    Web Designers Application Sketch Book
    Web Designers Application Sketch Book

    Think you have the next great web site idea? The Web Designers Application Sketch Book is an essential tool for any aspiring web designer. This sketch book makes it easy to centralize and organize your ideas, featuring enlarged browser window frame templates to write on. Professionally printed on high-quality...

    IntelliJ IDEA in Action
    IntelliJ IDEA in Action
    This book will help developers dig a little deeper into IDEA and embrace its streamlining features which allow for more time to be spent on project design rather than code management. Without some educational investment, however, IDEA can be just another editor. That then, is the purpose of this book. To not only get you up and running quickly, but...

    Creating a Presentation in PowerPoint: Visual QuickProject Guide
    Creating a Presentation in PowerPoint: Visual QuickProject Guide
    PowerPoint is nearly ubiquitous in today's world--in business settings, of course, but in schools and universities, clubs and organizations--almost everywhere you turn. It's not a difficult tool to use, but the presentations people create in PowerPoint range widely in quality--dazzling or dull, enlivening or enervating. Now, to help users deliver...
    Visual Basic(R) 2005 for Programmers (2nd Edition) (Deitel Developer Series)
    Visual Basic(R) 2005 for Programmers (2nd Edition) (Deitel Developer Series)

    The practicing programmer's DEITEL® guide to Visual Basic and the powerful Microsoft .NET Framework

    Written for C#, C++, Java or other-high level language programmers, this book applies the Deitel signature live-code approach to teaching programming and explores...

    Handbook of Vitamins, Fourth Edition (CLINICAL NUTRITION IN HEALTH AND DISEASE)
    Handbook of Vitamins, Fourth Edition (CLINICAL NUTRITION IN HEALTH AND DISEASE)
    ...An excellent overview of our understanding of the chemistry and metabolism of all of the known vitamins. Each is discussed in depth and detail by knowledgeable scientists. ...An excellent reference for the personal collection and for libraries. It provides an extraordinary amount of information about all of the vitamins.
    - Journal of
    ...
    ©2019 LearnIT (support@pdfchm.net) - Privacy Policy