Home > Store > Security > Network Security

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Register your product to gain access to bonus material or receive a coupon.

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Book

  • Your Price: $35.99
  • List Price: $44.99
  • Available on demand.

Description

  • Copyright 2003
  • Dimensions: 7 x 9 1/4
  • Pages: 288
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-140733-3
  • ISBN-13: 978-0-13-140733-6

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all your network traffic in real time; update Snort to reflect new security threats; automate and analyze Snort alerts; and more. Best of all, Rehman's custom scripts integrate Snort with Apache, MySQL, PHP, and ACID-so you can build and optimize a complete IDS solution more quickly than ever before.

  • An expert introduction to intrusion detection and the role of Snort
  • Writing and updating Snort rules to reflect the latest attacks and exploits
  • Contains detailed coverage of Snort plug-ins, preprocessors, and output modules
  • Logging alerts to a MySQL database
  • Using ACID to search, process, and analyze security alerts
  • Using SnortSnarf to analyze Snort log files
  • XML support for Snort via the Simple Network Markup Language (SNML)
FTP Site

The accompanying ftp site contains all the software, scripts, and rules you need to get started with Snort.

About the Open Source Series

Bruce Perens' Open Source Series is a definitive series of Linux and Open Source books by the world's leading Linux software developers. Bruce Perens is the primary author of The Open Source Definition, the formative document of the open source movement, and the former Debian GNU/Linux Project Leader. The text of this book is Open Source licensed

Downloads

Downloads

Download Intrusion Detection with SNORT in PDF

Extras

Links

To facilitate your exploration of Snort, we are providing links to the online resources listed in the reference section at the end of each chapter.

Chapter 1 Introduction to Intrusion Detection and Snort

Chapter 2 Installing Snort and Getting Started

Chapter 3 Working with Snort Rules

Chapter 4 Plugins, Preprocessors and Output Modules

Chapter 5 Using Snort with MySQL

Chapter 6 Using ACID and SnortSnarf with Snort

Chapter 7 Miscellaneous Tools

Sample Content

Online Sample Chapter

Working with Snort Rules

Downloadable Sample Chapter

Download the Sample Chapter related to this title.

Table of Contents



1. Introduction to Intrusion Detection and Snort.

What is Intrusion Detection? IDS Policy. Components of Snort. Dealing with Switches. TCP Stream Follow Up. Supported Platforms. How to Protect IDS Itself. References.



2. Installing Snort and Getting Started.

Snort Installation Scenarios. Installing Snort. Running Snort on Multiple Network Interfaces. Snort Command Line Options. Step-By-Step Procedure to Compile and Install Snort From Source Code. Location of Snort Files. Snort Modes. Snort Alert Modes. Running Snort in Stealth Mode. References.



3. Working with Snort Rules.

TCP/IP Network Layers. The First Bad Rule. CIDR. Structure of a Rule. Rule Headers. Rule Options. The Snort Configuration File. Order of Rules Based upon Action. Automatically Updating Snort Rules. Default Snort Rules and Classes. Sample Default Rules. Writing Good Rules. References.



4. Plugins, Preprocessors and Output Modules.

Preprocessors. Output Modules. Using BPF Fileters. References.



5. Using Snort with MySQL.

Making Snort Work with MySQL. Secure Logging to Remote Databases Securely Using Stunnel. Snort Database Maintenance. References.



6. Using ACID and SnortSnarf with Snort.

What is ACID? Installation and Configuration. Using ACID. SnortSnarf. Barnyard. References.



7. Miscellaneous Tools.

SnortSam. IDS Policy Manager. Securing the ACID Web Console. Easy IDS. References.



Appendix A: Introduction to tcpdump.


Appendix B: Getting Started with MySQL.


Appendix C: Packet Header Formats.


Appendix D: Glossary.


Appendix E: SNML DTD.


Index.

Index

Download the Index file related to this title.

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership