Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs

    Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises.

    About the Author
    Michael Rash is a Security Architect on the Dragon Intrusion Detection System with Enterasys Networks, Inc., and is a frequent contributor to open source projects. As the creator of psad, fwknop, and fwsnort, Rash is an expert on firewalls, IDSs, OS fingerprinting, and the Snort rules language. He is co-author of the book Snort 2.1 Intrusion Detection,lead-author and technical editor of the book Intrusion Prevention and Active Response, and has written security articles for Linux Journal, SysAdmin, and ;login:.

  • (HTML tags aren't allowed.)

    Illustrator CS4 Digital Classroom
    Illustrator CS4 Digital Classroom
    Illustrator CS4 Digital Classroom is like having a personal instructor guiding readers through each lesson, while they work at their own pace. This book includes 11 self-paced lessons that let readers discover essential skills and explore new features and capabilities of Adobe Illustrator CS4. Every lesson is presented in full color with...
    Making Creativity Practical: Innovation That Gets Results (Center for Creative Leadership)
    Making Creativity Practical: Innovation That Gets Results (Center for Creative Leadership)
    Creative solutions can be challenged and defended in the pursuit of profitability. But first, creativity must be demystified. A process that targets innovation provides leaders with just such a problem-solving approach. The goal is to produce high-quality ideas that are appropriate to the task—which means groups and organizations can...
    Practical Food Microbiology
    Practical Food Microbiology
    From the reviews of previous editions:-

    "much information from diverse sources concentrated in a user-friendly way. A worthwhile, well-priced book which should find its way into frequent use in many laboratories." Society for General Microbiology Quarterly

    "This book is a rare creature - a text of delightful clarity,...

    Frommer's Spain 2009 (Frommer's Complete Guides)
    Frommer's Spain 2009 (Frommer's Complete Guides)

    America’s #1 bestselling travel series

    Written by more than 175 outspoken travelers around the globe, Frommer’s Complete Guides help travelers experience places the way locals do.

    • More annually updated guides than any other series
    • 16-page color section and foldout map in all...
    Essentials of Managing Corporate Cash
    Essentials of Managing Corporate Cash
    Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this handy and concise book will help you stay up to date on the newest thinking, strategies and technologies in managing corporate cash.

    Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this...

    Apache The Definitive Guide, 3rd Edition
    Apache The Definitive Guide, 3rd Edition
    Updated to cover the changes in Apache's latest release, 2.0, as well as Apache 1.3, this useful guide discusses how to obtain, set up, secure, modify, and troubleshoot the Apache software on both Unix and Windows systems. In addition to covering the installation and configuration of mod_perl and Tomcat, the book examines PHP,...
    ©2018 LearnIT (support@pdfchm.net) - Privacy Policy