Network Attacks and Defenses

Book description

Using step-by-step processes to build and generate attacks using offensive techniques, this volume enables readers to implement appropriate network security solutions within a laboratory environment. Topics covered include CAM table poisoning attacks on network switches, ARP cache poisoning attacks, the detection and prevention of abnormal ARP traffic, network traffic sniffing and the detection of NICs running in promiscuous mode, and IP-based DoS attacks. It also examines reconnaissance traffic, network traffic filtering and inspection, and IPsec VPN security solution protocols, standards, types, and deployments.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/4)
  4. Contents (2/4)
  5. Contents (3/4)
  6. Contents (4/4)
  7. Introduction (1/2)
  8. Introduction (2/2)
  9. Chapter 1 - Switch’s CAM Table Poisoning Attack (1/4)
  10. Chapter 1 - Switch’s CAM Table Poisoning Attack (2/4)
  11. Chapter 1 - Switch’s CAM Table Poisoning Attack (3/4)
  12. Chapter 1 - Switch’s CAM Table Poisoning Attack (4/4)
  13. Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (1/6)
  14. Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (2/6)
  15. Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (3/6)
  16. Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (4/6)
  17. Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (5/6)
  18. Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (6/6)
  19. Chapter 3 - Abnormal ARP Traffic Detection and Prevention (1/9)
  20. Chapter 3 - Abnormal ARP Traffic Detection and Prevention (2/9)
  21. Chapter 3 - Abnormal ARP Traffic Detection and Prevention (3/9)
  22. Chapter 3 - Abnormal ARP Traffic Detection and Prevention (4/9)
  23. Chapter 3 - Abnormal ARP Traffic Detection and Prevention (5/9)
  24. Chapter 3 - Abnormal ARP Traffic Detection and Prevention (6/9)
  25. Chapter 3 - Abnormal ARP Traffic Detection and Prevention (7/9)
  26. Chapter 3 - Abnormal ARP Traffic Detection and Prevention (8/9)
  27. Chapter 3 - Abnormal ARP Traffic Detection and Prevention (9/9)
  28. Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (1/6)
  29. Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (2/6)
  30. Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (3/6)
  31. Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (4/6)
  32. Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (5/6)
  33. Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (6/6)
  34. Chapter 5 - IP-Based Denial-of-Service Attacks (1/7)
  35. Chapter 5 - IP-Based Denial-of-Service Attacks (2/7)
  36. Chapter 5 - IP-Based Denial-of-Service Attacks (3/7)
  37. Chapter 5 - IP-Based Denial-of-Service Attacks (4/7)
  38. Chapter 5 - IP-Based Denial-of-Service Attacks (5/7)
  39. Chapter 5 - IP-Based Denial-of-Service Attacks (6/7)
  40. Chapter 5 - IP-Based Denial-of-Service Attacks (7/7)
  41. Chapter 6 - Reconnaissance Traffic (1/6)
  42. Chapter 6 - Reconnaissance Traffic (2/6)
  43. Chapter 6 - Reconnaissance Traffic (3/6)
  44. Chapter 6 - Reconnaissance Traffic (4/6)
  45. Chapter 6 - Reconnaissance Traffic (5/6)
  46. Chapter 6 - Reconnaissance Traffic (6/6)
  47. Chapter 7 - Packet Filtering and Inspection (1/19)
  48. Chapter 7 - Packet Filtering and Inspection (2/19)
  49. Chapter 7 - Packet Filtering and Inspection (3/19)
  50. Chapter 7 - Packet Filtering and Inspection (4/19)
  51. Chapter 7 - Packet Filtering and Inspection (5/19)
  52. Chapter 7 - Packet Filtering and Inspection (6/19)
  53. Chapter 7 - Packet Filtering and Inspection (7/19)
  54. Chapter 7 - Packet Filtering and Inspection (8/19)
  55. Chapter 7 - Packet Filtering and Inspection (9/19)
  56. Chapter 7 - Packet Filtering and Inspection (10/19)
  57. Chapter 7 - Packet Filtering and Inspection (11/19)
  58. Chapter 7 - Packet Filtering and Inspection (12/19)
  59. Chapter 7 - Packet Filtering and Inspection (13/19)
  60. Chapter 7 - Packet Filtering and Inspection (14/19)
  61. Chapter 7 - Packet Filtering and Inspection (15/19)
  62. Chapter 7 - Packet Filtering and Inspection (16/19)
  63. Chapter 7 - Packet Filtering and Inspection (17/19)
  64. Chapter 7 - Packet Filtering and Inspection (18/19)
  65. Chapter 7 - Packet Filtering and Inspection (19/19)
  66. Chapter 8 - Router Security (1/11)
  67. Chapter 8 - Router Security (2/11)
  68. Chapter 8 - Router Security (3/11)
  69. Chapter 8 - Router Security (4/11)
  70. Chapter 8 - Router Security (5/11)
  71. Chapter 8 - Router Security (6/11)
  72. Chapter 8 - Router Security (7/11)
  73. Chapter 8 - Router Security (8/11)
  74. Chapter 8 - Router Security (9/11)
  75. Chapter 8 - Router Security (10/11)
  76. Chapter 8 - Router Security (11/11)
  77. Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (1/9)
  78. Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (2/9)
  79. Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (3/9)
  80. Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (4/9)
  81. Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (5/9)
  82. Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (6/9)
  83. Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (7/9)
  84. Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (8/9)
  85. Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (9/9)
  86. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (1/11)
  87. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (2/11)
  88. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (3/11)
  89. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (4/11)
  90. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (5/11)
  91. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (6/11)
  92. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (7/11)
  93. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (8/11)
  94. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (9/11)
  95. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (10/11)
  96. Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (11/11)
  97. Back Cover

Product information

  • Title: Network Attacks and Defenses
  • Author(s): Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew
  • Release date: October 2012
  • Publisher(s): Auerbach Publications
  • ISBN: 9781466517974