Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Extreme exploits : advanced defenses against hardcore hacks
Oppleman V., Friedrichs O., Watson B., McGraw-Hill Osborne Media, Columbus, OH, 2005. 448 pp. Type: Book (9780072259551)
Date Reviewed: Nov 8 2005

Securing a network is a multilayer process. This book addresses network security from an operational viewpoint, providing pragmatic coverage of a comprehensive arsenal for defense against the most common attacks encountered in real-life situations.

The book is structured into three major logical sections. The first section includes background chapters on routing architectures (border gateway protocol (BGP)) and securing the domain name system (DNS) infrastructure, and an amazing discussion on Internet service provider (ISP) security practices. Chapter 2 separates fact from fiction, and highlights the huge gap between the security policies implicitly assumed to be deployed by an ISP and those that are actually deployed.

The core of the book is contained in the second section, which addresses advanced defense techniques for reliable connectivity, secure network architectures, intrusion detection, application-level filtering, and securing wireless networks. Some of the issues discussed in this section make this book unique and very valuable. For instance, chapter 4 covers reliable connectivity, and goes into advanced topics like BGP security, including best practices for its configuration and unicast routing. Another chapter that shines for its clarity and quality of presentation is chapter 6. This chapter addresses the design of demilitarized zones (DMZs). A DMZ can be seen as an intermediary network between the Internet and the internal network, exposing some services to the outside; potential vulnerabilities in its design can compromise the internal network or affect business-critical operations. The authors discuss the core architectural design patterns for DMZs, and operational defensive techniques.

Another chapter that I enjoyed reading was chapter 10, which covers routing-level manipulations to counter distributed denial of service attacks, or to support passive reconnaissance actions. The basic idea here is to route suspicious traffic to “darknet” (nonoperational networks, used only to capture and gather evidence data), or to hinder a denial of service attack by routing the corresponding traffic to a black hole.

Section 3 is mostly about security assessment and digital forensics. ENtire books could be written about each of these topics so high-level overview coverage in a more general network security book is not surprising. Professionals having to perform such operations might need to read additional materials to master these topics, but for readers interested in getting a general grasp of these issues, the book is very informative.

What makes this book a superb and thrilling reading experience is its mix of a highly pedagogical and clear writing style, with conceptual, and technology-agnostic, information. The authors do not go into technology or implementation details, keeping the presentation focused on the concepts and the required essentials. The second section of the book is a true jewel on its own, where highly effective defense techniques based on subtle routing plane manipulation are illustrated in several deployment scenarios, is a true jewel on its own. The authors also provide a Web site (http://www.extremeexploits.com), where readers can easily download the tools mentioned in the book. The book covers only open source tools, so readers interested in practicing can do so without additional costs.

I strongly recommend this book to any network administrator, technical manager, or security-minded reader. Written in a very reader-friendly way, it provides an excellent state-of-the-art overview and guide to concepts and defensive solutions for network-level security.

Reviewer:  Radu State Review #: CR132003 (0609-0925)
Bookmark and Share
  Featured Reviewer  
 
Unauthorized Access (K.6.5 ... )
 
 
Invasive Software (K.6.5 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (C.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Unauthorized Access": Date
Testing and evaluating computer intrusion detection systems
Durst R., Champion T., Witten B., Miller E., Spagnuolo L. Communications of the ACM 42(7): 53-61, 1999. Type: Article
Aug 1 1999
Honeypots: tracking hackers
Spitzner L., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. Type: Book (9780321108951)
Jan 2 2003
Web hacking: attacks and defense
McClure S., Shah S., Shah S., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  492, Type: Book (9780201761764)
Jul 25 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy