C
O N T E N T S
 Chapter 1   
Introduction to Intrusion Detection and Snort
1
1.1 What is Intrusion Detection?
5
1.1.1
Some Definitions
6
1.1.2
Where IDS Should be Placed in Network Topology
8
1.1.3
Honey Pots
9
1.1.4
Security Zones and Levels of Trust
10
1.2 IDS Policy
10
1.3 Components of Snort
12
1.3.1
Packet Decoder
13
1.3.2
Preprocessors
13
1.3.3
The Detection Engine
14
1.3.4
Logging and Alerting System
15
1.3.5
Output Modules 
15
1.4 Dealing with Switches
16
1.5 TCP Stream Follow Up 
18
1.6 Supported Platforms
18
1.7 How to Protect IDS Itself
19
1.7.1
Snort on Stealth Interface 
20
1.7.2
Snort with no IP Address Interface
20
1.8 References
21
vii






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

toronto web hosting

 

Our partners: PHP: Hypertext Preprocessor Cheap Web Hosting JSP Web Hosting Ontario Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Java Hosting Cheapest Hosting

Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved