O'Reilly logo

Intrusion Detection with Snort by Jack Koziol

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Orchestrating an Attack

This section serves as a concise introduction to the genres of suspicious traffic you will encounter when using Snort. It is by no means an attempt to be all-inclusive or technically detailed. There are numerous resources, both in print and online, related to suspicious traffic analysis. If you have yet to develop intensive signature analysis expertise, this section will help you roughly understand the different genres of attack and their associated intent.

Several phases in orchestrating an attack (see Figure 1.1) are generic enough that they apply to most network-based attacks. Whether hackers are randomly searching for systems or targeting a specific company, they follow a tried-and-true methodology.

Figure 1.1. Phases ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required