Siguiente: GNU Free Documentation License Arriba: Sistemas de Detección de Intrusiones Previo: Apéndice D - Normativa legal

Apéndice E - Recursos  215

Libros  215

Recursos WWW     217

 


Apéndice E - Recursos

Libros

                Encontrar libros sobre seguridad informática no siempre es tarea fácil. En esta sección se incluye un conjunto de referencias que pueden servir de punto de partida. Se podrán encontrar entre ellas tanto escritos sobre Detección de Intrusiones como sobre seguridad en general.

 

Detección de Intrusiones y tecnologías similares

Amoroso, Edward G. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response. Intrusion.Net Books, febrero de 1999.

Bace, Rebecca. Intrusion Detection. Macmillan Technical Publishing, 2000.

Caswell, Brian , Jay Beale, James C. Foster, Jeremy Faircloth. Snort 2.0 Intrusion Detection. Syngress, 2003.

Escamilla, Terry. Intrusion Detection: Network Security Beyond the Firewall. John Wiley and Sons, 1998.

Freiss, Martin and R. Bach. Protecting Networks with Satan: Internet Security for System Administrators. O'Reilly and Associates, 1998.

Lance Spitzner. Honeypots: Tracking Hackers. Addison Wesley Professional, 2002.

Murray, James D. and D. Russell (ed.). Windows NT Event Logging. O'Reilly and Associates, 1998.

Northcutt, Stephen. Network Intrusion Detection: An Analysts' Handbook. Que, 1999.

Northcutt, Stephen and Judy Novak. Network Intrusion Detection. Que, 2002.

Northcutt, Stephen, Lenny Zeltser, Scott Winters, Karen Fredrick, Ronald W. Ritchey. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Que, 2002.

Northcutt, Stephen, Mark Cooper, Matt Fearnow, Karen Frederick. Intrusion Signatures and Analysis. Que, 2001.

Proctor, Paul E. Practical Intrusion Detection Handbook. Prentice Hall, 2000.

The Honeynet Project. Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Addison-Wesley Pub Co, 2001.

 

Seguridad general

Atkins, Derek. Internet Security: Professional Reference. New Riders Press, 1997.

Garfinkel, Simson and E. H. Spafford. Practical UNIX and Internet Security. O'Reilly and Associates, 1996.

Gollmann, Dieter. Computer Security. John Wiley & Son Ltd, 1999.

Jumes, James and Coopers and Lybrand. Microsoft Windows NT 4.0 Security, Audit, and Control. Microsoft Press, 1998.

Kaufman, Charlie, R. Perlman, M. Speciner, C. Kaufman. Network Security: Private Communication in a Public World. Prentice Hall, 2002.

Mann, Scott, E. L. Mitchell. Linux System Security: The Administrator's Guide to Open Source Security Tools. Prentice Hall, 1999.

Pfleeger, Charles P. Security in Computing. Prentice Hall, 2002.

Pipkin, Donald, Donald L. Pipkin. Information Security: Protecting the Global Enterprise. Prentice Hall, 2000.

Pooch, Udo and Gregory White. Computer System and Network Security. CRC Press, 1995.

Russell, Deborah. Computer Security Basics. O’Reilly and Associates, 1991.

 

Criptografía

Ferguson, Niels, Bruce Schneier. Practical Cryptography. John Wiley & Sons, 2003.

Garfinkel, Simson. PGP: Pretty Good Privacy. O’Reilly and Associates, 1995.

Menezes, Alfred J., Paul C. Van Oorschot, Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.

Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, 1995.

Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, 2000.

Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall, 2002.


Análisis forense

Casey, Eoghan. Digital Evidence and Computer Crime. Academic Press, 2000.

Casey, Eoghan. Handbook of Computer Crime Investigation: Forensic Tools & Technology. Academic Press, 2001.

Kruse II, Warren G., Jay G. Heiser. Computer Forensics: Incident Response Essentials. Addison-Wesley Pub Co., 2001.

Marcella, Albert J., R. S. Greenfield. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. Auerbach Publications, 2002.

Prosise, Chris, Kevin Mandia. Incident Response: Investigating Computer Crime. McGraw-Hill Osborne Media, 2001.

Vacca, John R., Michael Erbschloe. Computer Forensics: Computer Crime Scene Investigation. Charles River Media, 2002.

 


Casos concretos de aplicación

Garfinkel, Simson and E. H. Spafford. Web Security and Commerce. O’Reilly and Associates, 2002.

Ghosh, Anup K. B-Commerce Security: Weak Links, Best Defenses. John Wiley and Sons, 1998.

McGraw, Gary and E. Felten. Securing Java: Getting Down to Business with Mobile Code. John Wiley and Sons, 1999.


Historias sobre seguridad

Freedman, David and C. Mann. At Large: The Strange Case of the World’s Biggest Internet Invasion. Touchstone Books, 1998.

Slatala, Michelle. and J. Quittner. Masters of Deception: The Gang That Ruled Cyberspace. Perennial, 1996.

Stoll, Clifford. The Cuckoo’s Egg. Pocket Books, 2000.

 

 

Recursos WWW

(revisados en junio de 2003)

                El mundo de la seguridad de las tecnologías de la información es muy dinámico y exigente. Los expertos necesitan utilizar medios de comunicación capaces de adaptarse a estos cambios. Los recursos de Internet son perfectos para esta labor. Aunque las referencias a continuación no eximen de la lectura de los libros ya mencionados, es conveniente conocerlas para estar al tanto de las últimas noticias y novedades.


Portales de seguridad

Center for Education and Research in Information Assurance and Security, Purdue University
               
http://www.cerias.purdue.edu/

EnGarde System’s Secure Zone
               
http://www.securezone.com/

Hacking and Hackers - Computer Security Programs Downloading Search Engines Portal News
               
http://www.infosyssec.org/infosyssec/index.html

National Institute of Standards and Technology Computer Security Resource Clearinghouse
               
http://csrc.nist.gov


Información sobre vulnerabilidades y seguridad

@stake, Inc.
                http://www.atstake.com/

CERT Coordination Center, Carnegie Mellon University
               
http://www.cert.org

Computer Security News Daily
               
http://www.mountainwave.com

CriptoRed
       http://www.lpsi.eui.upm.es/criptored/criptored.htm

esCERT
       http://escert.upc.es/

Internet Security Systems’s Xforce vulnerability database
               
http://xforce.iss.net

IrisCERT
       http://www.rediris.es/cert/

NT-Bugtraq
               
http://www.ntbugtraq.com

Security Focus (Bugtraq, IDS, y otros foros de discusión)
                http://www.securityfocus.com/


Documentos sobre Detección de Intrusiones

·           Ranum, Marcus J. ICSA Labs IDSC. False Positives: a User's Guide to Making Sense of IDS Alarms. Febrero, 2003.   http://www.icsalabs.com/html/communities/ids/whitepaper/FalsePositives.pdf

·           Bace, Rebecca, Peter Mell. ICSA Labs. An Introduction to Intrusion Detection And Assessment.   http://www.infidel.net/Articles/ICSA_Whitepaper.pdf

·           Bace, Rebecca. NIST Special Publication on Intrusion Detection Systems. 1999.   http://csrc.nist.gov/publications/nistpubs/800-31/sp800-31.pdf

·          Lee, Wenke, Sal. Stolfo, and Kui Mok. A Data Mining Framework for Building Intrusion Detection Models. Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 1999.
   http://www.cc.gatech.edu/~wenke/papers/ieee_sp99_lee.ps

·          Kruegel, Christopher, Thomas Toth and Engin Kirda. Service Specific Anomaly Detection for Network Intrusion Detection. Symposium on Applied Computing (SAC), ACM Digital Library, Spain, March 2002.
   http://www.infosys.tuwien.ac.at/Staff/chris/doc/2002_03.ps

·         Ptacek, Thomas H. and T. Newsham. Insertions, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Enero 1998          .
   http://www.securityfocus.com/data/library/ids.ps


Productos, desarrollo

Agnitum - Outpost Firewall
               
http://www.agnitum.com/products/outpost/

Bindview Development
               
http://www.bindview.com

Bro
               
http://www.icir.org/vern/bro-info.html

Counterpane Systems
               
http://www.counterpane.com

EnGarde Systems
                http://www.engarde.com

Enterasys - Dragon Intrusion Detection System
               
http://www.enterasys.com/products/ids/

Enterasys Networks
                http://www.enterasys.com/home.html

IDSwakeup
                http://www.hsc.fr/ressources/outils/idswakeup/index.html

Internet Security Systems
               
http://www.iss.net

Intrusion Detection Cybersafe
               
http://www.cybersafe.com

Network Associates
               
http://www.nai.com

NIDSbench
               
http://packetstorm.widexs.nl/UNIX/IDS/nidsbench/nidsbench.html

Portcullis Computer Security Ltd. - Dragon Intrusion Detection System
               
http://www.portcullis-security.com/Products/

Prelude
               
http://www.prelude-ids.org

RSA Security Inc.
               
http://www.rsasecurity.com/

Snort
               
http://www.snort.org/

SRI International
               
http://www.csl.sri.com/programs/security/

Tripwire Security Systems
               
http://www.tripwiresecurity.com


Referencias variadas sobre Detección de Intrusiones

Dan Farmer’s security pages
               
http://www.fish.com

IDS FAQ
               
http://www.robertgraham.com/pubs/network-intrusion-detection.html

Michael Sobirey’s Intrusion Detection Systems page
               
http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html

SANS InfoSec Reading Room - Intrusion Detection
               
http://www.sans.org/rr/catindex.php?cat_id=30

SANS Institute Intrusion Detection FAQ
               
http://www.sans.org/resources/idfaq/

TruSecure Corporation
               
http://www.trusecure.com/

Intrusion Detection
               
http://cnscenter.future.co.kr/security/ids.html

SecurityFocus IDS
               
http://www.securityfocus.com/ids

Página personal de Wenke Lee
       http://www.cc.gatech.edu/~wenke/


Organizaciones

Advanced Computing Systems Association
               
http://www.usenix.org

Association for Computing Machinery
               
http://www.acm.org

Computer Security Institute
               
http://www.gocsi.com/

Information Systems Audit and Control Association (ISACA)
               
http://www.isaca.org

Institute of Electrical and Electronic Engineers (IEEE)
               
http://www.ieee.org

International Information Systems Security Association (ISSA)
               
http://www.issa-intl.org/

International Information Systems Security Certification Consortium (ISCC)
               
https://www.isc2.org/

Internet Engineering Task Force
               
http://www.ietf.org

Internet Society
               
http://www.isoc.org/

Intrusion Detection Working Group of IETF
               
http://www.ietf.org/html.charters/idwg-charter.html

System Administration, Networking, and Security Institute
               
http://www.sans.org/


Grupos de discusión, listas de correo

SecurityFocus - IDS Mailing List (Focus-ids)
               
http://www.securityfocus.com/archive/96

SecurityFocus - Forensics Mailing List (Forensics)
               
http://www.securityfocus.com/archive/104

SecurityFocus - Forensics in Spanish Mailing List (Forensics-es)
               
http://www.securityfocus.com/archive/128

SecurityFocus - Honeypots Mailing List (Honeypots)
               
http://www.securityfocus.com/archive/119

 


Normativa legal, organismos oficiales

Guardia Civil - Grupo de Delitos Telemáticos
                http://www.guardiacivil.org/00telematicos/

C.N.P. - Brigada de Investigación tecnológica
                http://www.mir.es/policia/bit/

Delitos Informáticos -- Información legal Nuevas Tecnologías
                http://www.delitosinformaticos.com/


Universidades

Iowa State University
               
http://www.issl.org

Purdue University
               
http://www.cs.purdue.edu

University of California, Davis
               
http://seclab.cs.ucdavis.edu

University of California, Santa Barbara
               
http://cs.ucsb.edu

University of Idaho
               
http://www.cs.uidaho.edu

University of Wollongong
               
http://www.uow.edu.au/

 


Siguiente: GNU Free Documentation License Arriba: Sistemas de Detección de Intrusiones Previo: Apéndice D - Normativa legal

Sistemas de Detección de Intrusiones, versión 1.01. Julio, 2003.
Diego González Gómez