Chapter 14. Network-Level Defense Strategies
“ Attack him where he is unprepared; appear where you are not expected.”
—Sun Tzu, The Art of War
The previous chapters have discussed defense techniques that focus on host-based solutions. This short chapter introduces worm behavior patterns on the wire and related technology that can detect and prevent worms and network intrusions, backdoors, and some types of DoS attacks.
The following key defense techniques will be discussed:
• Access lists using routers
• Firewalls
• NIDS (network-intrusion detection system)
• Honeypots
• Counterattacks
• Early warning systems
• Worm-capturing techniques
In this chapter, I will focus on worm behavior patterns with several network-level worm captures and related ...
Get Art of Computer Virus Research and Defense, The now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.