O'Reilly logo

The Tao of Network Security Monitoring Beyond Intrusion Detection by Richard Bejtlich

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

A

-A switch, P0f, 205

-a switch, Tethereal, 141

Abagnale Frank W., Art of the Steal: How to Protect Yourself and Your Business from Fraud, 421

Absolute BSD: The Ultimate Guide to FreeBSD (Lucas), 417

Absolute OpenBSD: UNIX for the Practical Paranoid (Lucas), 418

Abuse of services, 16

Access control in best practices, 350

access-list command, 272

Access lists, 249

access violations phrase, 249

Accessing

sensors, 98–99

console access, 99

in-band remote access, 100–101

out-of-band remote access, 101–102

zone traffic, 51

hubs, 52–56

inline devices, 76–84

SPAN ports, 56–63

summary, 84

taps. See Taps (test access ports)

Accountability features in Sguil, 322

Accounting, Cisco, 249–255

"Achilles' Heel in Signature-Based IDS: Squealing False Positives ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required