Intrusion Prevention and Active Response: Deploying Network and Host IPS

Front Cover
Elsevier, Mar 4, 2005 - Computers - 550 pages
Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
  • Corporate spending for Intrusion Prevention systems increased dramatically by 11% in the last quarter of 2004 alone
  • Lead author, Michael Rash, is well respected in the IPS Community, having authored FWSnort, which greatly enhances the intrusion prevention capabilities of the market-leading Snort IDS
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Packet Inspection for Intrusion Analysis
29
False Positives and Real Damage
73
Four Layers of IPS Actions
105
Network Inline Data Modification
133
Protecting Your Host Through the Operating System
193
IPS at the Application Layer
257
Deploying Open Source IPS Solutions
295
IPS Evasion Techniques Network
367
Index
389
Related Titles
404
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page i - Through this site, we've been able to provide readers a real time extension to the printed book. As a registered owner of this book, you will qualify for free access to our members-only solutions@syngress.com program. Once you have registered, you will enjoy several benefits, including: • Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format.

About the author (2005)

Angela Orebaugh (, GCIA, GCFW, GCIH, GSEC, CCNA) is a Senior Scientist in the Advanced Technology Research Center of Sytex, Inc. where she works with a specialized team to advance the state of the art in information systems security. She has over 10 years experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. She has a Masters in Computer Science, and is currently pursuing her Ph.D. with a concentration in Information Security at George Mason University.

Bibliographic information