⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 book-index.html

📁 入侵检测的相关教程
💻 HTML
📖 第 1 页 / 共 5 页
字号:
<DD>Network Flight Recorder, 279&#150;280
<DD>passwords, 49&#150;50
<DD>RealSecure, 277&#150;279, <B>278</B>
<DD>system level attacks may be missed, 272&#150;273
<DD>Windows NT security, 284&#150;285
</DL>
<DD>social engineering, passwords, 47&#150;49
<DD>sockets, socket addresses, user datagram protocol (UDP), 141&#150;142
<DD>SOCKS proxies, 150, 168
<DD>software applications (<I>See</I> <I>also</I> application security), 122, 125&#150;126
<DD>source addresses, network security, 124
<DD>source routing, network security, 148
<DD>spoofing, 18, 185, 191, 192, 319
<DL>
<DD>Internet Protocol (IP), 132, 133&#150;137
<DD>network security, 158&#150;159
</DL>
<DD>SRI, 179
<DD>Stalker, 227, 228&#150;235
<DL>
<DD>alternative configurations, 234&#150;235
<DD>attacks detected, 232&#150;233
<DD>Audit Management, 228, 229&#150;230
<DD>choosing to use Stalker, 233&#150;234
<DD>distributed intrusion detection, 241
<DD>ease of setup, 240&#150;241
<DD>Misuse Detector (MD), 228, 231&#150;232
<DD>monitoring security, 242&#150;243
<DD>privacy issues, 242&#150;243
<DD>Storage Manager, 228
<DD>threshold detection, 235
<DD>Trace/Browser (TB), 228, 230&#150;231
<DD>version 3 Stalker, 235
</DL>
<DD>statistical anomaly detection, 170&#150;173, 240, 318
<DD>sticky bits, UNIX security, 91
<DD>strong authentication, 72&#150;74
<DD>subjects (<I>See</I> <I>also</I> objects), 3&#150;4, 9, 314
<DL>
<DD>access control, 84
<DD>UNIX security, 33&#150;34
<DD>Windows NT security, 40
</DL>
<DD>subnets, 263&#150;264
<DD>superuser privilege attacks, 185&#150;186
<DD>superusers, UNIX security, 32&#150;33
<DD>symbolic links, 92&#150;93, 311
<DD>symmetric cryptography, 53
<DD>SYN Flood attack, 144, 159, 176, 191, 267, 290, 319
<DD>synchronization, network security, 116
<DD>syslog event logger, 195&#150;198
<DD>system level security, 24, 317&#150;318
<DL>
<DD>network security, 272&#150;273
<DD>sniffers, 272&#150;273
<DD>UNIX security, 259&#150;260
</DL>
<DD>System Network Architecture (SNA), 114
<DD>system security scanners, 214&#150;217, 317
</DL>
<P><FONT SIZE="+1"><B>T</B></FONT></P>
<DL>
<DD>tagging UIDs/GIDs, UNIX security, 33
<DD>Teardrop attack, 191, 290
<DD>Telnet, 121, 151&#150;152, 189, 192
<DD>TEMPEST security project, passwords, 50
<DD>test.cgi hack, 160, 164, <B>165, </B>191, 267
<DD>third-party authentication (<I>See</I> <I>also</I> authentication servers), 17, 52&#150;71
<DD>threads, Windows NT security, 283
<DD>threshold detection, 235
<DD>ticket granting server (TGS), Kerberos, 55&#150;61
<DD>tickets, Kerberos, 64
<DD>time services/time clocks, Kerberos, 63
<DD>time to live (TTL) values, Internet Protocol (IP), 130
<DD>timeouts, Internet Protocol (IP), 131
<DD>Tivoli Management Environment (TME), 110, 244, 308, 322
<DD>token cards (<I>See</I> <I>also</I> smart cards), 74&#150;76, <B>75</B>
<DD>trace logs, SeOS, 109
<DD>traceroute applications, 131
<DD>tracing path of access, 200&#150;206
<DD>tracking attacks, Internet Protocol (IP), 137&#150;138
<DD>training personnel in security, 306&#150;307
<DD>transmission control protocol (TCP), 142&#150;146
<DL>
<DD>application security, 145&#150;146
<DD>FTP, 145
<DD>hijacking sessions, 144
<DD>HTTP, 145
<DD>impersonation, 143
<DD>sequence number guessing, 143&#150;144
<DD>SYN Flood attack, 144
<DD>trusted hosts, 145&#150;146
</DL>
<DD>transparent proxies, 150
<DD>Tripwire, 94
<DD>Trojan Horses, 14, 24
<DL>
<DD>network security, 175
<DD>operating system security, 49
<DD>passwords, 49
<DD>Windows NT security, 284
</DL>
<DD>trust, access control, 128
<DD>trust boundaries
<DL>
<DD>attack opportunities, 9
<DD>database security, 7
<DD>operating system security, 7, 8
</DL>
<DD>trust relationships, 7, 8&#150;9
<DD>trusted computing base (TCB), 14
<DD>trusted hosts, transmission control protocol (TCP), 145&#150;146
<DD>trusted path, operating system security, 49
<DD>tunnel vs. transport mode transmission, network security, 139, 167&#150;168, <B>168</B>
<DD>two-factor authentication, 74&#150;77
<DD>two-party authentication, 35
</DL>
<P><FONT SIZE="+1"><B>U</B></FONT></P>
<DL>
<DD>UC Davis web sites, 178
<DD>unilateral or one-way authentication, 35, 65
<DD>unique identifiers, network security, 127
<DD>UNIX security, 227&#150;261, 327
<DL>
<DD>access control, 81, 84&#150;85, 87&#150;97
<DD>audit ID (AUID), 88
<DD>audit logs, 244&#150;245
<DD>auditing, 229&#150;230, 244&#150;245
<DD>background processes, 96
<DD>boot records, 96
<DD>browsing, 230&#150;231
<DD>buffer overflow attack, 258&#150;259
<DD>bugs, 245&#150;246, 260&#150;261
<DD>computer misuse detection system (CMDS), 227, 235&#150;240
<DD>configuration errors, 245&#150;246
<DD>credentials for I&#38;A, 33, 34, 96
<DD>cryptography/encryption, 35&#150;37
<DD>data encryption standard (DES), 36
<DD>denial of service attacks, 249&#150;251
<DD>detection of attacks by Stalker, 232&#150;233
<DD>discretionary access control (DAC), 33
<DD>distributed intrusion detection, 241
<DD>ease of security setup issues, 240&#150;241,
<DD>effective group IDs (EGID), 87&#150;97, 247&#150;259
<DD>effective user IDs (EUID), 87&#150;97, 247&#150;259, 247
<DD>Event Manager, 244
<DD>event monitoring, 244
<DD>FILE Delete audit events, 247
<DD>group IDs (GIDs), 31, 33, 62, 87&#150;96, 123, 247&#150;259
<DD>groups, 30
<DD>hard links, 92&#150;93
<DD>hash, cryptographic, 36
<DD>identification &#38; authentication (I&#38;A), 29, 30&#150;39
<DD>impersonation, 251&#150;256
<DD><I>init</I> processes, 96&#150;97
<DD>intrusion detection systems (IDS), 111
<DD>Kerberos, 61&#150;62
<DD>link counts, 92&#150;93
<DD>local attacks, 248&#150;261
<DD>locked down version, 162
<DD>login security, 34&#150;35
<DD>monitoring security, 242&#150;243
<DD>network information system (NIS/NIS&#43;), 37&#150;39
<DD>network security, 121, 160
<DD>new attack detection, 243
<DD>nonvolatile RAM (NVRAM), 96
<DD>out of band values, 35
<DD>password system, 31&#150;32, 35&#150;39, 91&#150;93
<DD>PATH hacking, 251&#150;256
<DD>pattern matching, 247&#150;248, 260
<DD>permissions, file and directory, 89&#150;94
<DD>permissions, increasing, 94&#150;96
<DD>phf hack, 160, 164
<DD>plaintext to ciphertext passwords, 36
<DD>power on self tests (POST), 96
<DD>primary groups, 31
<DD>privacy issues, 242&#150;243
<DD>privilege escalation attack, 184&#150;185, 256&#150;258
<DD>privileges, 33, 94&#150;96
<DD>process IDs (PIDs), 33
<DD>process inheritance, 34
<DD>race condition, 92&#150;93
<DD>real group IDs (RGIDs), 87&#150;97, 247&#150;259
<DD>real user IDs (RUID), 87&#150;97, 247&#150;259, 247
<DD>risk assessment, 245
<DD>root access problems, 33, 185&#150;186, 256&#150;258
<DD>salt for password enhancement, 36&#150;37
<DD>saved set-group IDs (SSGID), 88
<DD>saved set-user IDs (SSUID), 88
<DD>secondary group IDs, 87&#150;97
<DD>secondary groups, 31
<DD>security kernel, 13&#150;14
<DD>SeOS (Memco) to improve access control, 104&#150;110
<DD>shadow password files, 31&#150;32
<DD>shoulder surfing at login, 34
<DD>Stalker, 227, 228&#150;235
<DD>sticky bits, 91
<DD>storing passwords in central server, 37&#150;39
<DD>subjects, 33&#150;34
<DD>superuser privilege attacks, 185&#150;186
<DD>superusers, 32&#150;33
<DD>symbolic links, 92&#150;93
<DD>syslog event logger, 195&#150;198
<DD>system level attacks, 259&#150;260
<DD>tagging UIDs/GIDs, 33
<DD>test.cgi hack, 160, 164, <B>165</B>
<DD>threshold detection, 235
<DD>Tivoli Management Environment (TME), 110, 244
<DD>tracing, 230&#150;231
<DD>two-party authentication, 35
<DD>UMASK settings, 185
<DD>unilateral or one-way authentication, 35
<DD>updating resources, 243
<DD>username IDs (UIDs), 30&#150;31, 33, 62, 87&#150;96,123, 247&#150;259
<DD>usernames, 30
<DD>users, 30
<DD>vulnerability scanners, 209
<DD>wrapper attacks, 90
<DD>writing to another&#146;s special files, 256
</DL>
<DD>updating resources, 243
<DD>Usenix Security, 243
<DD>user datagram protocol (UDP), 141&#150;142
<DL>
<DD>Kerberos, 64
<DD>ports, 141&#150;142
<DD>sockets, socket addresses, 141&#150;142
</DL>
<DD>username IDs (UIDs), 30&#150;31, 33, 62, 87&#150;97, 113, 123, 247&#150;259
<DD>usernames, UNIX security, 30
<DD>users, 122&#150;124
<DL>
<DD>database security, 7
<DD>network security, 122&#150;124
<DD>precedence of users, 123
<DD>UNIX security, 30
<DD>Windows NT security, 39&#150;40
</DL>
</DL>
<P><FONT SIZE="+1"><B>V</B></FONT></P>
<DL>
<DD>virtual private networks (VPN), 129, 146
<DD>voice prints, 16, 78
<DD>vulnerability scanners (<I>See</I> <I>also</I> scanners), 173&#150;174, 209&#150;226, 268, 317
<DL>
<DD>Ballista, 224
<DD>how they work, 209&#150;211, 213&#150;214
<DD>IBM Network Security Auditor, 224&#150;225
<DD>Internet Scanner, 218&#150;223, <B>220, 221</B>
<DD>ISS SAFESuite, 214&#150;217, <B>218</B>
<DD>local scanners, 211&#150;212
<DD>remote scanners, 212&#150;213
<DD>system security scanners, 214&#150;217
<DD>updating scanner products, 225
<DD>Windows NT security, 284
</DL>
</DL>
<P><FONT SIZE="+1"><B>W</B></FONT></P>
<DL>
<DD>warning users of potential threats, 307
<DD>weak CGI attacks, 161, 167
<DD>WheelGroup, 225
<DD>Windows NT security, 327
<DL>
<DD>.bat bug, 291
<DD>.cmd bug, 291
<DD>access control, 81, 84&#150;85, 97&#150;102, 285&#150;287
<DD>access control entries (ACE), 98, 283
<DD>access control lists (ACL), 98, 283
<DD>access tokens, 283
<DD>Anonymous vulner-ability, 291
<DD>auditing, 285&#150;287
<DD>buffer overflow attacks, 292
<DD>bugs, 290
<DD>Centrax, 294&#150;297, <B>295, 297,</B> 318&#150;319
<DD>comparison of IDS products, 293&#150;300
<DD>configuration errors, 292&#150;293
<DD>data source security, 284&#150;288
<DD>discretionary access control (DAC), 98&#150;102
<DD>domain controllers, 39, 41&#150;42, <B>43</B>
<DD>duplicate token system calls, 290
<DD>event logs, 195, 285&#150;287
<DD>event records, 286&#150;288
<DD>file management, 285&#150;287
<DD>file system, NT (NTFS), 98
<DD>groups, 39&#150;40
<DD>hijacking sessions, 290
<DD>identification &#38; authentication (I&#38;A), 29, 39&#150;42
<DD>impersonation, 289&#150;290
<DD>Internet information server (IIS), 284
<DD>intrusion detection systems (IDS), 111, 283&#150;301
<DD>KSA and KSM (Security Dynamics), 299&#150;300
<DD>local security authority (LSA), 40&#150;41
<DD>local vulnerabilities, 292&#150;293
<DD>locked down version, 162
<DD>login security, 40&#150;41, 285, 292&#150;293
<DD>NBSTAT command, 291&#150;292
<DD>NTbugtraq, 288
<DD>ntfsdos.exe attack, 292
<DD>passwords, 292&#150;293
<DD>permissions, 98&#150;102, 292&#150;293
<DD>Ping of Death, 290
<DD>privilege escalation, 288&#150;289
<DD>privileges, 97&#150;98, 283
<DD>processes, 283
<DD>RealSecure, 297&#150;298
<DD>registry information, 39&#150;40
<DD>registry permissions, 102
<DD>remote attacks, 290&#150;292
<DD>rights, 97&#150;98
<DD>SAFESuite, 297&#150;298
<DD>security account manager (SAM), 40
<DD>security identifiers (SIDs), 40&#150;41, 97, 123
<DD>security kernel, 13&#150;14
<DD>security reference monitor (SRM), 283
<DD>security review, 283
<DD>SeOS (Memco) to improve access control, 104&#150;110
<DD>shared resource vulnerability, 291
<DD>sniffers, 284&#150;285
<DD>special permissions, 98&#150;102
<DD>standard permissions, 98&#150;102
<DD>subjects, 40
<DD>SYN Flood attack, 290
<DD>system level tools, 318&#150;319
<DD>Teardrop attack, 290
<DD>threads, 283
<DD>Tivoli Management Environment (TME), 110
<DD>Trojan Horses, 284
<DD>users, 39&#150;40
<DD>vulnerability scanners, 209, 284
<DD>what to monitor, 288&#150;293
<DD>Winlogon, 40
</DL>
<DD>workstations, security kernel, 13&#150;14
<DD>wrappers, 90, 116
<DD>write access, 10
</DL>
<P><FONT SIZE="+1"><B>X</B></FONT></P>
<DL>
<DD>X.509 digital certificates, 54, 67&#150;71, 152, 164&#150;165, 321
<DL>
<DD>attribute-value pairs, 68
<DD>bilateral authentication, 67&#150;68
<DD>certificate authority (CA), 68, 69
<DD>certificate revocat

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -