Index

A

-A switch, P0f, 205

-a switch, Tethereal, 141

Abagnale Frank W., Art of the Steal: How to Protect Yourself and Your Business from Fraud, 421

Absolute BSD: The Ultimate Guide to FreeBSD (Lucas), 417

Absolute OpenBSD: UNIX for the Practical Paranoid (Lucas), 418

Abuse of services, 16

Access control in best practices, 350

access-list command, 272

Access lists, 249

access violations phrase, 249

Accessing

sensors, 98–99

console access, 99

in-band remote access, 100–101

out-of-band remote access, 101–102

zone traffic, 51

hubs, 52–56

inline devices, 76–84

SPAN ports, 56–63

summary, 84

taps. See Taps (test access ports)

Accountability features in Sguil, 322

Accounting, Cisco, 249–255

"Achilles' Heel in Signature-Based IDS: Squealing False Positives ...

Get The Tao of Network Security Monitoring Beyond Intrusion Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.