

Linux Firewalls : Attack Detection and Response (Paperback)
Key item features
Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.
Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:
–Passive network authentication and OS fingerprinting
–iptables log analysis and policies
–Application layer attack detection with the iptables string match extension
–Building an iptables ruleset that emulates a Snort ruleset
–Port knocking vs. Single Packet Authorization (SPA)
–Tools for visualizing iptables logs
Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables—along with psad and fwsnort—to detect and even prevent compromises.
Specs
- Book formatPaperback
- Fiction/nonfictionNon-Fiction
- GenreComputing & Internet
- Pages336
- Number in series1
- Edition1st Edition
- Free shipping
Free 30-day returns
How do you want your item?
About this item
Product details
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.
Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.
Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:
Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises.
Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.
Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:
–Passive network authentication and OS fingerprinting
–iptables log analysis and policies
–Application layer attack detection with the iptables string match extension
–Building an iptables ruleset that emulates a Snort ruleset
–Port knocking vs. Single Packet Authorization (SPA)
–Tools for visualizing iptables logs
Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables—along with psad and fwsnort—to detect and even prevent compromises.
Specifications
Book format
Fiction/nonfiction
Genre
Pages
Warranty
Warranty information
Similar items you might like
Based on what customers bought
Cybersecurity for Small Networks : A Guide for the Reasonably Paranoid (Paperback) $24.48
$2448current price $24.48Cybersecurity for Small Networks : A Guide for the Reasonably Paranoid (Paperback)
LiveSafe: Threat Countermeasures, (Paperback) $35.31
$3531current price $35.31LiveSafe: Threat Countermeasures, (Paperback)
Hardening Hardening Windows Systems, (Paperback) $39.15
$3915current price $39.15Hardening Hardening Windows Systems, (Paperback)
Troubleshooting Citrix XenApp(R) (Paperback) $37.98
$3798current price $37.98Troubleshooting Citrix XenApp(R) (Paperback)
LiveSafe: Threat Countermeasures, (Hardcover) $46.00
$4600current price $46.00LiveSafe: Threat Countermeasures, (Hardcover)
Advanced Persistent Threats in Cybersecurity: Cyber Warfare, (Paperback) $31.15
$3115current price $31.15Advanced Persistent Threats in Cybersecurity: Cyber Warfare, (Paperback)
Web Application Vulnerabilities: Detect, Exploit, Prevent, (Paperback) $80.42
$8042current price $80.42Web Application Vulnerabilities: Detect, Exploit, Prevent, (Paperback)
Cybersecurity Issues in Emerging Technologies, (Paperback) $49.59
$4959current price $49.59Cybersecurity Issues in Emerging Technologies, (Paperback)
Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR, (Paperback) $38.83
$3883current price $38.83Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR, (Paperback)
Palgrave Studies in Cybercrime and Cyber Cyberwarfare: Threats to Critical Infrastructure, (Paperback) $38.34
$3834current price $38.34Palgrave Studies in Cybercrime and Cyber Cyberwarfare: Threats to Critical Infrastructure, (Paperback)
Reduced price Malware Data Science: Attack Detection and Attribution, (Paperback) $35.85 Was $40.56
Reduced price
$3585current price $35.85, Was $40.56$40.56Malware Data Science: Attack Detection and Attribution, (Paperback)
Cisco Security Specialist's Guide to Pix Firewall, (Paperback) $80.86
$8086current price $80.86Cisco Security Specialist's Guide to Pix Firewall, (Paperback)
Practical OPNsense: Building Enterprise Firewalls with Open Source, (Paperback) $37.89
$3789current price $37.89Practical OPNsense: Building Enterprise Firewalls with Open Source, (Paperback)
Reduced price Nmap 6: Network Exploration and Security Auditing Cookbook (Paperback) $41.59
Reduced price
$4159current price $41.59Nmap 6: Network Exploration and Security Auditing Cookbook (Paperback)
Traffic Control unter Linux (Paperback) $46.42
$4642current price $46.42Traffic Control unter Linux (Paperback)
Ultimate Penetration Testing with Nmap, (Paperback) $37.09
$3709current price $37.09Ultimate Penetration Testing with Nmap, (Paperback)
Intrusion Detection With Mondrian and Snort (Paperback) $49.95
$4995current price $49.95Intrusion Detection With Mondrian and Snort (Paperback)
Novel Polymeric Biochips for Enhanced Detection of Infectious Diseases, (Paperback) $56.14
$5614current price $56.14Novel Polymeric Biochips for Enhanced Detection of Infectious Diseases, (Paperback)
Adelphi Protecting Critical Infrastructures Against Cyber-Attack, (Paperback) $47.99
$4799current price $47.99Adelphi Protecting Critical Infrastructures Against Cyber-Attack, (Paperback)
Plasmonic Nanosensors for Detection of Aqueous Toxic Metals, (Paperback) $65.99
$6599current price $65.99Plasmonic Nanosensors for Detection of Aqueous Toxic Metals, (Paperback)
