Siguiente: GNU Free Documentation License Arriba: Sistemas de Detección de Intrusiones Previo: Apéndice D - Normativa legal
Encontrar libros sobre seguridad informática no siempre es tarea fácil. En esta sección se incluye un conjunto de referencias que pueden servir de punto de partida. Se podrán encontrar entre ellas tanto escritos sobre Detección de Intrusiones como sobre seguridad en general.
Detección de Intrusiones y tecnologías similares
Amoroso, Edward G. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response. Intrusion.Net Books, febrero de 1999.
Bace, Rebecca. Intrusion Detection. Macmillan Technical Publishing, 2000.
Caswell, Brian , Jay Beale, James C. Foster, Jeremy Faircloth. Snort 2.0 Intrusion Detection. Syngress, 2003.
Escamilla, Terry. Intrusion Detection: Network Security Beyond the Firewall. John Wiley and Sons, 1998.
Freiss, Martin and R. Bach. Protecting Networks with Satan: Internet Security for System Administrators. O'Reilly and Associates, 1998.
Lance Spitzner. Honeypots: Tracking Hackers. Addison Wesley Professional, 2002.
Murray, James D. and D. Russell (ed.). Windows NT Event Logging. O'Reilly and Associates, 1998.
Northcutt, Stephen. Network Intrusion Detection: An Analysts' Handbook. Que, 1999.
Northcutt, Stephen and Judy Novak. Network Intrusion Detection. Que, 2002.
Northcutt, Stephen, Lenny Zeltser, Scott Winters, Karen Fredrick, Ronald W. Ritchey. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Que, 2002.
Northcutt, Stephen, Mark Cooper, Matt Fearnow, Karen Frederick. Intrusion Signatures and Analysis. Que, 2001.
Proctor, Paul E. Practical Intrusion Detection Handbook. Prentice Hall, 2000.
The Honeynet Project. Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Addison-Wesley Pub Co, 2001.
Seguridad general
Atkins, Derek. Internet Security: Professional Reference. New Riders Press, 1997.
Garfinkel, Simson and E. H. Spafford. Practical UNIX and Internet Security. O'Reilly and Associates, 1996.
Gollmann, Dieter. Computer Security. John Wiley & Son Ltd, 1999.
Jumes, James and Coopers and Lybrand. Microsoft Windows NT 4.0 Security, Audit, and Control. Microsoft Press, 1998.
Kaufman, Charlie, R. Perlman, M. Speciner, C. Kaufman. Network Security: Private Communication in a Public World. Prentice Hall, 2002.
Mann, Scott, E. L. Mitchell. Linux System Security: The Administrator's Guide to Open Source Security Tools. Prentice Hall, 1999.
Pfleeger, Charles P. Security in Computing. Prentice Hall, 2002.
Pipkin, Donald, Donald L. Pipkin. Information Security: Protecting the Global Enterprise. Prentice Hall, 2000.
Pooch, Udo and Gregory White. Computer System and Network Security. CRC Press, 1995.
Russell, Deborah. Computer Security Basics. O’Reilly and Associates, 1991.
Criptografía
Ferguson, Niels, Bruce Schneier. Practical Cryptography. John Wiley & Sons, 2003.
Garfinkel, Simson. PGP: Pretty Good Privacy. O’Reilly and Associates, 1995.
Menezes, Alfred J., Paul C. Van Oorschot, Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, 1995.
Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, 2000.
Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall, 2002.
Análisis
forense
Casey, Eoghan. Digital Evidence and Computer Crime. Academic Press, 2000.
Casey, Eoghan. Handbook of Computer Crime Investigation: Forensic Tools & Technology. Academic Press, 2001.
Kruse II, Warren G., Jay G. Heiser. Computer Forensics: Incident Response Essentials. Addison-Wesley Pub Co., 2001.
Marcella, Albert J., R. S. Greenfield. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. Auerbach Publications, 2002.
Prosise, Chris, Kevin Mandia. Incident Response: Investigating Computer Crime. McGraw-Hill Osborne Media, 2001.
Vacca, John R., Michael Erbschloe. Computer Forensics: Computer Crime Scene Investigation. Charles River Media, 2002.
Casos concretos de aplicación
Garfinkel, Simson and E. H. Spafford. Web Security and Commerce. O’Reilly and Associates, 2002.
Ghosh, Anup K. B-Commerce Security: Weak Links, Best Defenses. John Wiley and Sons, 1998.
McGraw, Gary and E. Felten. Securing Java: Getting Down to Business with Mobile Code. John Wiley and Sons, 1999.
Historias sobre
seguridad
Freedman, David and C. Mann. At Large: The Strange Case of the World’s Biggest Internet Invasion. Touchstone Books, 1998.
Slatala, Michelle. and J. Quittner. Masters of Deception: The Gang That Ruled Cyberspace. Perennial, 1996.
Stoll, Clifford. The Cuckoo’s Egg. Pocket Books, 2000.
(revisados en junio de 2003)
El mundo de la seguridad de las tecnologías de la información es muy dinámico y exigente. Los expertos necesitan utilizar medios de comunicación capaces de adaptarse a estos cambios. Los recursos de Internet son perfectos para esta labor. Aunque las referencias a continuación no eximen de la lectura de los libros ya mencionados, es conveniente conocerlas para estar al tanto de las últimas noticias y novedades.
Portales de
seguridad
Center for
Education and Research in Information Assurance and Security,
Purdue University
http://www.cerias.purdue.edu/
EnGarde
System’s Secure Zone
http://www.securezone.com/
Hacking
and Hackers - Computer Security Programs Downloading Search Engines
Portal News
http://www.infosyssec.org/infosyssec/index.html
National
Institute of Standards and Technology Computer Security Resource
Clearinghouse
http://csrc.nist.gov
Información
sobre vulnerabilidades y seguridad
@stake, Inc.
http://www.atstake.com/
CERT
Coordination Center, Carnegie Mellon University
http://www.cert.org
Computer
Security News Daily
http://www.mountainwave.com
CriptoRed
http://www.lpsi.eui.upm.es/criptored/criptored.htm
esCERT
http://escert.upc.es/
Internet
Security Systems’s Xforce vulnerability database
http://xforce.iss.net
IrisCERT
http://www.rediris.es/cert/
NT-Bugtraq
http://www.ntbugtraq.com
Security Focus (Bugtraq, IDS,
y otros foros de discusión)
http://www.securityfocus.com/
Documentos sobre
Detección de Intrusiones
· Ranum, Marcus J. ICSA Labs IDSC. False Positives: a User's Guide to Making Sense of IDS Alarms. Febrero, 2003. http://www.icsalabs.com/html/communities/ids/whitepaper/FalsePositives.pdf
· Bace, Rebecca, Peter Mell. ICSA Labs. An Introduction to Intrusion Detection And Assessment. http://www.infidel.net/Articles/ICSA_Whitepaper.pdf
· Bace, Rebecca. NIST Special Publication on Intrusion Detection Systems. 1999. http://csrc.nist.gov/publications/nistpubs/800-31/sp800-31.pdf
·
Lee, Wenke, Sal. Stolfo, and Kui Mok. A Data
Mining Framework for Building Intrusion Detection Models.
Proceedings of the 1999 IEEE Symposium on Security and Privacy,
Oakland, CA, May 1999.
http://www.cc.gatech.edu/~wenke/papers/ieee_sp99_lee.ps
·
Kruegel, Christopher, Thomas Toth and Engin
Kirda. Service Specific Anomaly Detection for Network Intrusion
Detection. Symposium on Applied Computing (SAC), ACM Digital
Library, Spain, March 2002.
http://www.infosys.tuwien.ac.at/Staff/chris/doc/2002_03.ps
·
Ptacek, Thomas H. and T. Newsham. Insertions,
Evasion, and Denial of Service: Eluding Network Intrusion
Detection. Enero
1998 .
http://www.securityfocus.com/data/library/ids.ps
Productos,
desarrollo
Agnitum -
Outpost Firewall
http://www.agnitum.com/products/outpost/
Bindview
Development
http://www.bindview.com
Bro
http://www.icir.org/vern/bro-info.html
Counterpane Systems
http://www.counterpane.com
EnGarde Systems
http://www.engarde.com
Enterasys
- Dragon Intrusion Detection System
http://www.enterasys.com/products/ids/
Enterasys Networks
http://www.enterasys.com/home.html
IDSwakeup
http://www.hsc.fr/ressources/outils/idswakeup/index.html
Internet
Security Systems
http://www.iss.net
Intrusion
Detection Cybersafe
http://www.cybersafe.com
Network
Associates
http://www.nai.com
NIDSbench
http://packetstorm.widexs.nl/UNIX/IDS/nidsbench/nidsbench.html
Portcullis
Computer Security Ltd. - Dragon Intrusion Detection System
http://www.portcullis-security.com/Products/
Prelude
http://www.prelude-ids.org
RSA
Security Inc.
http://www.rsasecurity.com/
Snort
http://www.snort.org/
SRI
International
http://www.csl.sri.com/programs/security/
Tripwire
Security Systems
http://www.tripwiresecurity.com
Referencias
variadas sobre Detección de Intrusiones
Dan
Farmer’s security pages
http://www.fish.com
IDS
FAQ
http://www.robertgraham.com/pubs/network-intrusion-detection.html
Michael
Sobirey’s Intrusion Detection Systems page
http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html
SANS
InfoSec Reading Room - Intrusion Detection
http://www.sans.org/rr/catindex.php?cat_id=30
SANS
Institute Intrusion Detection FAQ
http://www.sans.org/resources/idfaq/
TruSecure
Corporation
http://www.trusecure.com/
Intrusion
Detection
http://cnscenter.future.co.kr/security/ids.html
SecurityFocus IDS
http://www.securityfocus.com/ids
Página personal de
Wenke Lee
http://www.cc.gatech.edu/~wenke/
Organizaciones
Advanced
Computing Systems Association
http://www.usenix.org
Association for Computing Machinery
http://www.acm.org
Computer
Security Institute
http://www.gocsi.com/
Information Systems Audit and Control Association
(ISACA)
http://www.isaca.org
Institute
of Electrical and Electronic Engineers (IEEE)
http://www.ieee.org
International Information Systems Security Association
(ISSA)
http://www.issa-intl.org/
International Information Systems Security Certification
Consortium (ISCC)
https://www.isc2.org/
Internet
Engineering Task Force
http://www.ietf.org
Internet
Society
http://www.isoc.org/
Intrusion
Detection Working Group of IETF
http://www.ietf.org/html.charters/idwg-charter.html
System
Administration, Networking, and Security Institute
http://www.sans.org/
Grupos de
discusión, listas de correo
SecurityFocus - IDS Mailing List (Focus-ids)
http://www.securityfocus.com/archive/96
SecurityFocus - Forensics Mailing List (Forensics)
http://www.securityfocus.com/archive/104
SecurityFocus - Forensics in Spanish Mailing List
(Forensics-es)
http://www.securityfocus.com/archive/128
SecurityFocus - Honeypots Mailing List (Honeypots)
http://www.securityfocus.com/archive/119
Normativa legal,
organismos oficiales
Guardia Civil - Grupo de
Delitos Telemáticos
http://www.guardiacivil.org/00telematicos/
C.N.P. - Brigada de
Investigación tecnológica
http://www.mir.es/policia/bit/
Delitos Informáticos
-- Información legal Nuevas Tecnologías
http://www.delitosinformaticos.com/
Universidades
Iowa State
University
http://www.issl.org
Purdue
University
http://www.cs.purdue.edu
University
of California, Davis
http://seclab.cs.ucdavis.edu
University
of California, Santa Barbara
http://cs.ucsb.edu
University
of Idaho
http://www.cs.uidaho.edu
University
of Wollongong
http://www.uow.edu.au/
Siguiente: GNU Free Documentation License Arriba: Sistemas de Detección de Intrusiones Previo: Apéndice D - Normativa legal
Sistemas de
Detección de Intrusiones, versión 1.01. Julio,
2003.
Diego González Gómez