Table of Contents
Previous Section Next Section

Chapter 14. Network-Level Defense Strategies

" Attack him where he is unprepared; appear where you are not expected."

Sun Tzu, The Art of War

The previous chapters have discussed defense techniques that focus on host-based solutions. This short chapter introduces worm behavior patterns on the wire and related technology that can detect and prevent worms and network intrusions, backdoors, and some types of DoS attacks.

The following key defense techniques will be discussed:

  • Access lists using routers

  • Firewalls

  • NIDS (network-intrusion detection system)

  • Honeypots

  • Counterattacks

  • Early warning systems

  • Worm-capturing techniques

In this chapter, I will focus on worm behavior patterns with several network-level worm captures and related detection and prevention technology. I will avoid giving too much background information, which could easily make this chapter the length of several books!

    Table of Contents
    Previous Section Next Section