Due to extensivegrowth of the Internet, increasing availability of tools and methods forintruding and attacking networks, intrusion detection has become a criticalcomponent of network security parameters. TCP/IP protocol suite is the defactostandard for communication on the Internet. The underlying vulnerabilities inthe TCP/IP protocols, Routing Protocols, Security Protocols is the root causeof intrusions. Therefor Intrusion detection system becomes an important elementin network security that controls real time data and leads to huge dimensionalproblem. The authors provides the readers the layered approach of TCP/IP modelto achieve early, faster intrusion detection and network protection.
In this book, we willlearn about
- TCP/IP suit,vulnerabilities, attacks and defense mechanism
- Cryptography andCryptanalysis
- Routing protocols,vulnerabilities, attacks and defense mechanism
- Secuirty protocols,vulnerabilities, attacks and defense mechanism
- Framework for IPSfor detection and protection of known and unknown attacks
- Implementation ofIPS using open source tools
- Network design withcase studies
- Various networktools
In this firstedition, we tried to evaluate attack at every level of TCP/IP Model bycombining network intrusion detection and layered approach.