Atjaunināt sīkdatņu piekrišanu

E-grāmata: Honeypots: A New Paradigm to Information Security [Taylor & Francis e-book]

Edited by (Michigan Technological University, Houghton, USA, and IIT, Roorkee, India), Edited by (IIT, Roorkee, India)
  • Formāts: 342 pages
  • Izdošanas datums: 03-Feb-2011
  • Izdevniecība: Science Publishers,U.S.
  • ISBN-13: 9780429061905
Citas grāmatas par šo tēmu:
  • Taylor & Francis e-book
  • Cena: 257,91 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standarta cena: 368,44 €
  • Ietaupiet 30%
  • Formāts: 342 pages
  • Izdošanas datums: 03-Feb-2011
  • Izdevniecība: Science Publishers,U.S.
  • ISBN-13: 9780429061905
Citas grāmatas par šo tēmu:
This comprehensive guide to the theory and practical use of honeypots for the collection and study of network attacks provides students, network administrators and security professionals with a collection of useful strategies and illustrative case studies for implementing a variety of useful security traps. Topics discussed include built and commercially available honypots, honeynets, static, virtual and dynamic honeypots, wireless honeypots, deployment and applications, anti-honeypot technologies and network forensics. The work includes numerous illustrations and code examples as well as chapter review exercises. Distributed by CRC Press. Annotation ©2011 Book News, Inc., Portland, OR (booknews.com)
Preface v
1 Honeypots
1(37)
1.1 Background
2(5)
1.1.1 History and Evolution of Honeypots
6(1)
1.2 Honeypots
7(3)
1.2.1 Generic Honeypot Model
8(2)
1.3 Honeypots vs. Firewalls and Intrusion Detection Systems
10(4)
1.3.1 Firewalls
11(1)
1.3.2 Intrusion Detection Systems
11(1)
1.3.3 Honeypots
12(2)
1.4 Classification of Honeypots
14(7)
1.4.1 Based on Usage
14(1)
1.4.2 Based on Level of Interaction
15(4)
1.4.3 Based on Hardware Deployment Type
19(1)
1.4.4 Based on Role of Honeypot
19(2)
1.5 Placement of Honeypots
21(5)
1.5.1 External Placement
21(2)
1.5.2 Internal Placement
23(1)
1.5.3 DMZ Placement
24(2)
1.5.4 On the Whole
26(1)
1.6 Varieties of Honeypots: Honeytokens, Honeypages, Honeynets and Honeyfarms
26(2)
1.6.1 Honeytokens
26(1)
1.6.2 Honeypages
27(1)
1.6.3 Honeynets
27(1)
1.6.4 Honeyfarms
27(1)
1.7 Value of Honeypots'
28(4)
1.7.1 Low False-Positives
28(1)
1.7.2 Early Detection
28(1)
1.7.3 New Threat Detection
29(1)
1.7.4 Defense in Depth
29(1)
1.7.5 Other Advantages of Honeypots
30(2)
1.8 Risks and Tradeoffs
32(1)
1.9 Key Issues and Challenges
33(1)
1.10 Summary
34(4)
Exercises
34(2)
References
36(2)
2 Commercially Available Honeypots
38(25)
2.1 Back Officer Friendly
39(11)
2.2 Specter
50(7)
2.3 Mantrap
57(2)
2.4 Honeyd
59(2)
2.5 Summary
61(2)
Exercises
62(1)
References
62(1)
3 Honeynets
63(28)
3.1 Overview of Honeynets
63(1)
3.2 Value of Honeynets
64(5)
3.2.1 Methods, Motives, and Evolving Tools
65(1)
3.2.2 Trend Analysis
66(1)
3.2.3 Incident Response
67(2)
3.2.4 Testbed
69(1)
3.3 Working of Honeynet
69(4)
3.3.1 Controlling Data
70(1)
3.3.2 Capturing Data
71(1)
3.3.3 Collecting Data
72(1)
3.4 Honeynet Architectures
73(14)
3.4.1 Gen I
74(8)
3.4.2 Gen II
82(5)
3.5 Sweetening the Honeynets
87(1)
3.6 Risks Associated with Honeynets
88(1)
3.7 Summary
89(2)
Exercises
90(1)
References
90(1)
4 Attacks and Role of Honeypots
91(29)
4.1 Phases of Attack and Honeypots
92(3)
4.1.1 Prevention
92(1)
4.1.2 Detection
93(1)
4.1.3 Response
94(1)
4.1.4 Research
94(1)
4.2 Worms and Virus Attacks
95(7)
4.2.1 Worms
95(5)
4.2.2 Virus Attacks
100(2)
4.3 Spam and Phishing Mails
102(11)
4.3.1 Spams
103(8)
4.3.2 Phishing
111(2)
4.4 Distributed Denial of Service Attacks
113(5)
4.5 Summary
118(2)
Exercises
118(1)
References
119(1)
5 Static Honeypots
120(20)
5.1 Honeypot as Detection Systems
121(5)
5.1.1 Japonica: Objectives and Requirements
121(1)
5.1.2 Framework and Components
122(4)
5.2 Honeypot as Deception Systems
126(11)
5.3 Summary
137(3)
Exercises
138(1)
References
139(1)
6 Virtual Honeypots
140(29)
6.1 Virtual Honeypot: VMware Workstation
141(1)
6.2 Data Capture on Virtual Honeypots
142(2)
6.3 Raw Disks and Virtual Disks
144(1)
6.4 Virtual Honeynet
145(1)
6.5 Case Study
146(21)
6.6 Summary
167(2)
Exercises
167(1)
References
168(1)
7 Dynamic Honeypots
169(18)
7.1 Issues with Static Honeypots
169(1)
7.2 Dynamic Honeypots
170(4)
7.3 Dynamic Honeypot Design
174(6)
7.3.1 Proposed Design Overview
175(2)
7.3.2 Active Probing
177(1)
7.3.3 Passive Fingerprinting
177(1)
7.3.4 Honeyd
178(1)
7.3.5 The Database
179(1)
7.3.6 Dynamic Honeypot Engine
179(1)
7.4 Dynamic Honeypot Construction
180(5)
7.4.1 Graphic User Interface
184(1)
7.5 Benefits
185(1)
7.6 Summary
185(2)
Exercises
186(1)
References
186(1)
8 Wireless Honeypots
187(50)
8.1 Introduction to Wireless Local Area Networks
188(3)
8.2 Basic Wireless Concepts
191(4)
8.2.1 Stations and APs
191(1)
8.2.2 Infrastructure and Ad Hoc Modes
192(1)
8.2.3 Frames
193(1)
8.2.4 Authentication
193(1)
8.2.5 Association
194(1)
8.3 802.11 Security
195(5)
8.3.1 Access Control List
195(1)
8.3.2 WEP (Wired Equivalent Privacy)
195(4)
8.3.3 WPA (Wi-Fi Protected Access)
199(1)
8.3.4 802.11i
199(1)
8.4 Wireless Attacks: From A Blackhat's Perspective
200(9)
8.4.1 Passive Attacks on Wireless Networks
200(2)
8.4.2 Active Attacks on Wireless Networks
202(1)
8.4.3 Man-in-the-Middle Attacks on Wireless Networks
203(1)
8.4.4 Jamming Attacks on Wireless Networks
204(1)
8.4.5 Some other Attacks
205(4)
8.5 Wireless Honeypots
209(23)
8.5.1 Needs and Goals of Wireless Honeypots
209(1)
8.5.2 Wireless Honeypot History
210(3)
8.5.3 Theory and Design
213(1)
8.5.4 Wireless Activity
214(1)
8.5.5 Wireless Architectures
215(6)
8.5.6 Some Practical examples to create Honeypots
221(4)
8.5.7 Existing Wireless Architectures on Wireless Honeypots
225(2)
8.5.8 Wireless Tools
227(3)
8.5.9 Wireless Honeypot using Wired Tools
230(2)
8.6 Limitations
232(1)
8.7 Summary
233(4)
Exercises
234(1)
References
235(2)
9 Applications of Honeypots
237(12)
9.1 Defense against Automated Attacks
237(2)
9.2 Protection against Human Intruders
239(1)
9.3 Surgical Detection Methods
239(1)
9.4 Cyber-Forensics
239(1)
9.5 Network Surveillance
240(1)
9.6 Forensic Analysis
241(1)
9.7 Tactical Battlefield
242(4)
9.8 Use as Deterrent
246(1)
9.9 Research Purpose
246(1)
9.10 Summary
246(3)
Exercises
247(1)
References
248(1)
10 Anti-Honeypot Technology
249(49)
10.1 Network Issues
250(9)
10.1.1 Honeypot and Fingerprinting: Practical Examples
251(8)
10.2 System Issues
259(14)
10.3 Techniques For Honeypot Detection
273(16)
10.3.1 Honeypot Hunters
274(4)
10.3.2 Honeypot Detection in Advanced Botnet Attacks
278(9)
10.3.3 Mapping Internet Sensors With Probe Response Attacks
287(2)
10.4 Countermeasure for Detection of Honeypot Deployment
289(7)
10.4.1 The Honeyanole System
290(4)
10.4.2 A Hybrid Honeypot Architecture for Scalable Network Monitoring
294(2)
10.5 Summary
296(2)
Exercises
297(1)
References
297(1)
11 Honeypots and Network Forensics
298(27)
11.1 Network Forensics
300(5)
11.1.1 Classification of Network Forensics Systems
301(2)
11.1.2 Motivation for Network Forensics
303(1)
11.1.3 Honeypot approaches for Network Forensics
304(1)
11.2 Honeypot as Network Forensic Analysis Tools
305(6)
11.3 Honeypot Based Network Forensics Frameworks
311(9)
11.3.1 Generic Process Model
312(3)
11.3.2 Honeypot Based Frameworks for Forensics
315(5)
11.4 Summary
320(5)
Exercises
321(1)
References
322(3)
Index 325
Joshi, R. C.; Sardana, Anjali