Linux Firewalls

Linux Firewalls

Attack Detection and Response With Iptables, Psad, and Fwsnort

Book - 2007
Rate this:
Baker & Taylor
Addressing the firewall capabilities of Linux, a handbook for security professionals describes the Netfilter infrastruction in the Linux kernel and explains how to use Netfilter as an intrusion detection system by integrating it with custom open source software and Snort rulesets, discussin such topics as Linux firewall log analysis and policies, passive network authentication and authorization, and more. Original. (Intermediate)

Ingram Book Company
The Netfilter firewall built into Linux provides capabilities that rival many commercial firewalls. Providing concrete examples to illustrate concepts, this new reference explores using Netfilter as an intrusion detection system (IDS) by combining it with Snort rule sets and custom software available from the author's site, cipherdyne.org.

Book News
A security architect with Enterasys Networks, Rash shows system administrators how the iptables firewall on Linux systems is well positioned to take advantage of the trend in security to combine application layer inspection techniques from the intrusion detection world with the ability to filter network traffic. He focuses on three open source software projects: psad, fwsnort, and fwknop. He does not provide bibliographical references. Annotation ©2007 Book News, Inc., Portland, OR (booknews.com)

Ingram Publishing Services

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs

    Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises.


  • The Netfilter firewall built into Linux provides capabilities that rival many commercial firewalls. Providing concrete examples to illustrate concepts, this new reference explores using Netfilter as an intrusion detection system (IDS) by combining it with Snort rule sets and custom software available from the author's site, cipherdyne.org.


    Publisher: San Francisco : No Starch Press, c2007
    ISBN: 9781593271411
    1593271417
    Characteristics: xix, 308 p. : ill. ; 24 cm

    Related Resources


    Opinion

    From the critics


    Community Activity

    Comment

    Add a Comment

    There are no comments for this title yet.

    Age

    Add Age Suitability

    There are no ages for this title yet.

    Summary

    Add a Summary

    There are no summaries for this title yet.

    Notices

    Add Notices

    There are no notices for this title yet.

    Quotes

    Add a Quote

    There are no quotes for this title yet.

    Explore Further

    Browse by Call Number

    Recommendations

    Subject Headings

      Loading...

    Find it at SMCL

      Loading...
    []
    []
    To Top