O'Reilly logo

Art of Computer Virus Research and Defense, The by Peter Szor

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14. Network-Level Defense Strategies

“ Attack him where he is unprepared; appear where you are not expected.”

—Sun Tzu, The Art of War

The previous chapters have discussed defense techniques that focus on host-based solutions. This short chapter introduces worm behavior patterns on the wire and related technology that can detect and prevent worms and network intrusions, backdoors, and some types of DoS attacks.

The following key defense techniques will be discussed:

• Access lists using routers

• Firewalls

• NIDS (network-intrusion detection system)

• Honeypots

• Counterattacks

• Early warning systems

• Worm-capturing techniques

In this chapter, I will focus on worm behavior patterns with several network-level worm captures and related ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required