Knowing when someone is knocking on your door.
Source: Lance Spitzner - Posted by Benjamin D. Thomas   
Intrusion Detection Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. This article will discuss how you can protect yourself by detecting these intrusion attempts. I will then cover . . . Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. This article will discuss how you can protect yourself by detecting these intrusion attempts. I will then cover what you can do when you discover these attempts.

The methods we will be discussing are simple in use and implementation. For larger or more security conscientious organizations, you may want to consider third party Intrusion Detection Systems, such as Network Flight Recorder (http://www.nfr.net/nfr). These more advanced IDS systems use traffic analysis and advance algorithms to determine if a probe has been conducted. Our approach will be somewhat simpler.

There are a variety of different probes hackers will attempt. The first type we will prepare for is one of the most common, port scans. Port scans are where an inidvidual attempts to connect to a variety of different ports. The scans can be used on a specific target, or used to scan entire IP ranges, often chosen at random This is one of the most popular information gathering methods used by hackers today as it identifies what ports and services are open.

Read this full article at Lance Spitzner

Only registered users can write comments.
Please login or register.

Powered by AkoComment!