Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Extrusion detection : security monitoring for internal intrusions
Bejtlich R., Addison-Wesley Professional, 2005. 416 pp. Type: Book (9780321349965)
Date Reviewed: Feb 10 2006

Although most readers are probably familiar with the term intrusion detection and its general underlying function, they are probably not familiar with extrusion detection, a new concept that may become an emerging key technology in network security. Behind this concept is a series of techniques and approaches for monitoring outbound connections in order to detect a potential intruder or a violation of in-place security policies. Outbound connections are initiated from your network toward the outside, and, at a first glance, monitoring them seems to be just a simple and straightforward extension of general network monitoring. I then tried to imagine what would happen if I had to deploy an outbound monitoring architecture on a high-speed network. Many nontrivial technical questions quickly overwhelmed me. What hardware should I use? A simple FreeBSD box with some monitoring software might work well for a small enterprise, but will it work for a lar!ge campus network with high-speed connections in the gigabit range? Beyond having the right hardware, where would I install it? Should it be in the demilitarized zone, within the internal network, or in both? How does network address translation (NAT) affect the monitoring process? What type of traffic and network behavior should I look into? How should I do the monitoring, which might be used as evidence in court one day?

Bejtlich does a superb job in his book of addressing these questions, and provides directly applicable solutions and precise technical answers. He starts with defining the scope and challenges of extrusion detection, and then goes into all the required details and technical issues associated with it. The book covers the essentials, providing information on how to get the right hardware, how to install a multiport tap (including graphic illustrations), and how to deploy it correctly so that both the internal and the demilitarized networks are monitored. He also describes some traffic-specific analysis using open source tools (sguil, snort, argus, and sancp are the most important). An important part of the book is dedicated to describing defensible networks and implementing access control mechanisms.

This book is not limited to detecting malicious human-initiated activities. Two chapters are essential, and address bots--malicious pieces of software that turn a computer into a zombie, remotely controlled by a hacker.

Having read Bejtlich’s two other books [1,2], I was familiar with his technical accuracy and easy-to-follow writing style. Difficult concepts and technologies are clearly explained and abundantly illustrated with figures and do-it-yourself instructions. A reader with average skills can easily follow both the theoretical contents and the practical details.

I strongly recommend this book to any reader interested in intrusion detection, general network security, and network security monitoring. I also encourage potential readers to visit the author’s Web site (http://www.taosecurity.com), where he maintains a daily technical blog that is highly relevant to network security monitoring and extrusion detection.

Reviewer:  Radu State Review #: CR132416 (0612-1245)
1) Bejtlich , R. The tao of network security monitoring: beyond intrusion detection. Addison-Wesley Professional, Boston, MA, 2004.
2) Jones, K.; Bejtlich, R.; Rose, C. Real digital forensics: computer security and incident response. Addison-Wesley Professional, Boston, MA, 2005.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Unauthorized Access (K.6.5 ... )
 
 
Authentication (D.4.6 ... )
 
 
Authentication (K.6.5 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (C.2.0 )
 
 
Security and Protection (D.4.6 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Unauthorized Access": Date
Testing and evaluating computer intrusion detection systems
Durst R., Champion T., Witten B., Miller E., Spagnuolo L. Communications of the ACM 42(7): 53-61, 1999. Type: Article
Aug 1 1999
Honeypots: tracking hackers
Spitzner L., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. Type: Book (9780321108951)
Jan 2 2003
Web hacking: attacks and defense
McClure S., Shah S., Shah S., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  492, Type: Book (9780201761764)
Jul 25 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy