Book

Extrusion Detection: Security Monitoring for Internal Intrusions

📖 Overview

Extrusion Detection focuses on network security monitoring (NSM) with an emphasis on detecting and responding to data theft and unauthorized network access from within organizations. The book presents strategies for identifying internal network threats through analysis of network traffic patterns and system behaviors. The text outlines methods for implementing NSM sensors and collecting network evidence through packet captures, session data, and full content monitoring. Technical details cover deployment architectures, incident response procedures, and case studies of real-world intrusion scenarios. The author draws from extensive field experience to provide practical guidance on building defensive monitoring capabilities and investigating security incidents. Configuration examples and command-line tools are included to help readers implement the concepts. At its core, this work addresses the critical challenge of protecting organizational assets from threats that originate inside the network perimeter. The focus on internal threats represented an important shift in network security thinking when the book was published.

👀 Reviews

Readers highlight the book's focus on network security monitoring and intrusion detection through a practical lens. Multiple reviewers note the strong emphasis on real-world examples and tools. Liked: - Clear explanations of traffic analysis concepts - Detailed command line examples - BSD and open source tool coverage - Focus on defensive techniques rather than just attacks Disliked: - Some outdated technical content (2005 publication) - Limited coverage of modern threats - Heavy focus on Unix/BSD systems with minimal Windows content - Some redundant examples and verbose sections Ratings: Amazon: 4.2/5 (12 reviews) Goodreads: 3.9/5 (28 ratings) "The detailed packet analysis examples helped translate theory into practice" - Amazon reviewer "Too focused on specific tools rather than broader concepts that would age better" - Goodreads reviewer "Strong foundation but needs updating for current security landscape" - Amazon reviewer

📚 Similar books

Network Security Through Data Analysis by Michael Collins Presents techniques for collecting and analyzing network data to detect intrusion patterns and malicious activities.

Applied Network Security Monitoring by Chris Sanders and Jason Smith Focuses on the practical implementation of network security monitoring with detailed coverage of tools, tactics, and incident response procedures.

The Practice of Network Security Monitoring by Richard Bejtlich Provides a framework for understanding network security monitoring through real-world scenarios and deployment strategies.

Network Security Monitoring: Basics for Defenders by Chris Sanders Explains fundamental concepts of security monitoring by focusing on network protocols, data collection methods, and analysis techniques.

Security Engineering by Ross Anderson Examines security from systems perspective while covering technical components, human factors, and organizational challenges in security monitoring.

🤔 Interesting facts

🔍 Richard Bejtlich began his security career as an intelligence officer in the U.S. Air Force, specializing in network security operations. 📚 The book was one of the first comprehensive guides (published in 2005) to focus specifically on detecting threats from within an organization rather than external attacks. 🖥️ Bejtlich coined the term "Network Security Monitoring (NSM)" which became a fundamental concept in modern cybersecurity practices. 🛡️ The techniques described in the book were heavily influenced by Bejtlich's experience running TaoSecurity, his security consultancy that worked with Fortune 500 companies. 💡 The book introduced the "Collection, Detection, and Analysis" framework for security monitoring, which is still referenced in contemporary security operations centers (SOCs).