Siguiente: GNU Free Documentation License Arriba: Sistemas de Detección de Intrusiones Previo: Apéndice D - Normativa legal

Apéndice E - Recursos  215

Libros  215

Recursos WWW     217


Apéndice E - Recursos


                Encontrar libros sobre seguridad informática no siempre es tarea fácil. En esta sección se incluye un conjunto de referencias que pueden servir de punto de partida. Se podrán encontrar entre ellas tanto escritos sobre Detección de Intrusiones como sobre seguridad en general.


Detección de Intrusiones y tecnologías similares

Amoroso, Edward G. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response. Intrusion.Net Books, febrero de 1999.

Bace, Rebecca. Intrusion Detection. Macmillan Technical Publishing, 2000.

Caswell, Brian , Jay Beale, James C. Foster, Jeremy Faircloth. Snort 2.0 Intrusion Detection. Syngress, 2003.

Escamilla, Terry. Intrusion Detection: Network Security Beyond the Firewall. John Wiley and Sons, 1998.

Freiss, Martin and R. Bach. Protecting Networks with Satan: Internet Security for System Administrators. O'Reilly and Associates, 1998.

Lance Spitzner. Honeypots: Tracking Hackers. Addison Wesley Professional, 2002.

Murray, James D. and D. Russell (ed.). Windows NT Event Logging. O'Reilly and Associates, 1998.

Northcutt, Stephen. Network Intrusion Detection: An Analysts' Handbook. Que, 1999.

Northcutt, Stephen and Judy Novak. Network Intrusion Detection. Que, 2002.

Northcutt, Stephen, Lenny Zeltser, Scott Winters, Karen Fredrick, Ronald W. Ritchey. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Que, 2002.

Northcutt, Stephen, Mark Cooper, Matt Fearnow, Karen Frederick. Intrusion Signatures and Analysis. Que, 2001.

Proctor, Paul E. Practical Intrusion Detection Handbook. Prentice Hall, 2000.

The Honeynet Project. Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Addison-Wesley Pub Co, 2001.


Seguridad general

Atkins, Derek. Internet Security: Professional Reference. New Riders Press, 1997.

Garfinkel, Simson and E. H. Spafford. Practical UNIX and Internet Security. O'Reilly and Associates, 1996.

Gollmann, Dieter. Computer Security. John Wiley & Son Ltd, 1999.

Jumes, James and Coopers and Lybrand. Microsoft Windows NT 4.0 Security, Audit, and Control. Microsoft Press, 1998.

Kaufman, Charlie, R. Perlman, M. Speciner, C. Kaufman. Network Security: Private Communication in a Public World. Prentice Hall, 2002.

Mann, Scott, E. L. Mitchell. Linux System Security: The Administrator's Guide to Open Source Security Tools. Prentice Hall, 1999.

Pfleeger, Charles P. Security in Computing. Prentice Hall, 2002.

Pipkin, Donald, Donald L. Pipkin. Information Security: Protecting the Global Enterprise. Prentice Hall, 2000.

Pooch, Udo and Gregory White. Computer System and Network Security. CRC Press, 1995.

Russell, Deborah. Computer Security Basics. O’Reilly and Associates, 1991.



Ferguson, Niels, Bruce Schneier. Practical Cryptography. John Wiley & Sons, 2003.

Garfinkel, Simson. PGP: Pretty Good Privacy. O’Reilly and Associates, 1995.

Menezes, Alfred J., Paul C. Van Oorschot, Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.

Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, 1995.

Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, 2000.

Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall, 2002.

Análisis forense

Casey, Eoghan. Digital Evidence and Computer Crime. Academic Press, 2000.

Casey, Eoghan. Handbook of Computer Crime Investigation: Forensic Tools & Technology. Academic Press, 2001.

Kruse II, Warren G., Jay G. Heiser. Computer Forensics: Incident Response Essentials. Addison-Wesley Pub Co., 2001.

Marcella, Albert J., R. S. Greenfield. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. Auerbach Publications, 2002.

Prosise, Chris, Kevin Mandia. Incident Response: Investigating Computer Crime. McGraw-Hill Osborne Media, 2001.

Vacca, John R., Michael Erbschloe. Computer Forensics: Computer Crime Scene Investigation. Charles River Media, 2002.


Casos concretos de aplicación

Garfinkel, Simson and E. H. Spafford. Web Security and Commerce. O’Reilly and Associates, 2002.

Ghosh, Anup K. B-Commerce Security: Weak Links, Best Defenses. John Wiley and Sons, 1998.

McGraw, Gary and E. Felten. Securing Java: Getting Down to Business with Mobile Code. John Wiley and Sons, 1999.

Historias sobre seguridad

Freedman, David and C. Mann. At Large: The Strange Case of the World’s Biggest Internet Invasion. Touchstone Books, 1998.

Slatala, Michelle. and J. Quittner. Masters of Deception: The Gang That Ruled Cyberspace. Perennial, 1996.

Stoll, Clifford. The Cuckoo’s Egg. Pocket Books, 2000.



Recursos WWW

(revisados en junio de 2003)

                El mundo de la seguridad de las tecnologías de la información es muy dinámico y exigente. Los expertos necesitan utilizar medios de comunicación capaces de adaptarse a estos cambios. Los recursos de Internet son perfectos para esta labor. Aunque las referencias a continuación no eximen de la lectura de los libros ya mencionados, es conveniente conocerlas para estar al tanto de las últimas noticias y novedades.

Portales de seguridad

Center for Education and Research in Information Assurance and Security, Purdue University

EnGarde System’s Secure Zone

Hacking and Hackers - Computer Security Programs Downloading Search Engines Portal News

National Institute of Standards and Technology Computer Security Resource Clearinghouse

Información sobre vulnerabilidades y seguridad

@stake, Inc.

CERT Coordination Center, Carnegie Mellon University

Computer Security News Daily



Internet Security Systems’s Xforce vulnerability database



Security Focus (Bugtraq, IDS, y otros foros de discusión)

Documentos sobre Detección de Intrusiones

·           Ranum, Marcus J. ICSA Labs IDSC. False Positives: a User's Guide to Making Sense of IDS Alarms. Febrero, 2003.

·           Bace, Rebecca, Peter Mell. ICSA Labs. An Introduction to Intrusion Detection And Assessment.

·           Bace, Rebecca. NIST Special Publication on Intrusion Detection Systems. 1999.

·          Lee, Wenke, Sal. Stolfo, and Kui Mok. A Data Mining Framework for Building Intrusion Detection Models. Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 1999.

·          Kruegel, Christopher, Thomas Toth and Engin Kirda. Service Specific Anomaly Detection for Network Intrusion Detection. Symposium on Applied Computing (SAC), ACM Digital Library, Spain, March 2002.

·         Ptacek, Thomas H. and T. Newsham. Insertions, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Enero 1998          .

Productos, desarrollo

Agnitum - Outpost Firewall

Bindview Development


Counterpane Systems

EnGarde Systems

Enterasys - Dragon Intrusion Detection System

Enterasys Networks


Internet Security Systems

Intrusion Detection Cybersafe

Network Associates


Portcullis Computer Security Ltd. - Dragon Intrusion Detection System


RSA Security Inc.


SRI International

Tripwire Security Systems

Referencias variadas sobre Detección de Intrusiones

Dan Farmer’s security pages


Michael Sobirey’s Intrusion Detection Systems page

SANS InfoSec Reading Room - Intrusion Detection

SANS Institute Intrusion Detection FAQ

TruSecure Corporation

Intrusion Detection

SecurityFocus IDS

Página personal de Wenke Lee


Advanced Computing Systems Association

Association for Computing Machinery

Computer Security Institute

Information Systems Audit and Control Association (ISACA)

Institute of Electrical and Electronic Engineers (IEEE)

International Information Systems Security Association (ISSA)

International Information Systems Security Certification Consortium (ISCC)

Internet Engineering Task Force

Internet Society

Intrusion Detection Working Group of IETF

System Administration, Networking, and Security Institute

Grupos de discusión, listas de correo

SecurityFocus - IDS Mailing List (Focus-ids)

SecurityFocus - Forensics Mailing List (Forensics)

SecurityFocus - Forensics in Spanish Mailing List (Forensics-es)

SecurityFocus - Honeypots Mailing List (Honeypots)


Normativa legal, organismos oficiales

Guardia Civil - Grupo de Delitos Telemáticos

C.N.P. - Brigada de Investigación tecnológica

Delitos Informáticos -- Información legal Nuevas Tecnologías


Iowa State University

Purdue University

University of California, Davis

University of California, Santa Barbara

University of Idaho

University of Wollongong


Siguiente: GNU Free Documentation License Arriba: Sistemas de Detección de Intrusiones Previo: Apéndice D - Normativa legal

Sistemas de Detección de Intrusiones, versión 1.01. Julio, 2003.
Diego González Gómez