Preface |
|
xi | |
|
|
xiii | |
|
|
xxi | |
|
|
xxiii | |
|
|
xxv | |
|
|
1 | (2) |
|
|
|
|
|
I Deception Technologies & Threat Visibility - Honeypots and Security Operations |
|
|
3 | (130) |
|
2 Honeynet - Deploying a Connected System of Diverse Honey-pots Using Open-Source Tools |
|
|
5 | (46) |
|
|
|
|
|
|
|
6 | (1) |
|
2.2 Classification of Honeypots |
|
|
7 | (2) |
|
2.3 Design of the Honeynet |
|
|
9 | (4) |
|
2.3.1 Hosting Environment |
|
|
9 | (1) |
|
|
9 | (4) |
|
2.3.3 Web Applications Hosted |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (12) |
|
2.4.1 Deployment of Servers |
|
|
14 | (4) |
|
2.4.2 Security and Monitoring of Honeypots/Honeynet |
|
|
18 | (1) |
|
2.4.3 Security - UFW - Firewall |
|
|
19 | (2) |
|
2.4.4 Monitoring - Elastic Stack |
|
|
21 | (1) |
|
|
22 | (3) |
|
|
25 | (1) |
|
2.5 Threat Analytics Using Elastic Stack |
|
|
25 | (21) |
|
2.5.1 Using Standard Reports Available in Kibana |
|
|
25 | (1) |
|
2.5.2 Developing Custom Reports in Kibana |
|
|
26 | (1) |
|
2.5.3 Manual Reports Based on Manual Analysis of Data Dumps and Selected Data from Kibana Reports |
|
|
26 | (1) |
|
|
27 | (2) |
|
2.5.5 Standard Kibana Analytic Reports |
|
|
29 | (6) |
|
2.5.6 Custom Reports Developed in Kibana |
|
|
35 | (11) |
|
2.6 Manual Threat Analysis |
|
|
46 | (2) |
|
2.6.1 Attacks to Exploit CVE-2012-1823 Vulnerability |
|
|
47 | (1) |
|
2.6.2 Attempts by BotNets to Upload Malware |
|
|
47 | (1) |
|
2.6.3 Attempts to Scan Using Muieblackcat |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (2) |
|
3 Implementation of Honeypot, NIDs, and HIDs Technologies in SOC Environment |
|
|
51 | (16) |
|
|
|
|
|
|
|
52 | (1) |
|
3.2 Setup and Architecture |
|
|
53 | (6) |
|
|
53 | (1) |
|
|
54 | (2) |
|
3.2.3 Host-based Intrusion Detection Systems (HIDS) |
|
|
56 | (1) |
|
3.2.4 Network-Based Intrusion Detection Systems (NIDS) |
|
|
56 | (3) |
|
3.3 Approach to the Final Setup |
|
|
59 | (5) |
|
|
59 | (1) |
|
|
59 | (5) |
|
3.4 Information Security Best Practices |
|
|
64 | (1) |
|
3.5 Industries and Sectors Under Study |
|
|
65 | (2) |
|
3.5.1 Educational Institutes |
|
|
65 | (1) |
|
3.5.2 Hospitals and Pharmaceutical Companies |
|
|
65 | (1) |
|
3.5.3 Manufacturing Industry |
|
|
66 | (1) |
|
4 Leveraging Research Honeypots for Generating Credible Threat Intelligence and Advanced Threat Analytics |
|
|
67 | (44) |
|
|
|
|
|
|
|
67 | (1) |
|
|
67 | (1) |
|
4.3 How to Find the Right Honeypot for Your Environment |
|
|
68 | (3) |
|
|
68 | (1) |
|
|
69 | (1) |
|
4.3.3 Customization, Obfuscation, and Implementation Considerations |
|
|
70 | (1) |
|
4.4 A Deep Dive in Solution Architecture |
|
|
71 | (4) |
|
4.5 Configuring and Deploying Cowrie Honeypot |
|
|
75 | (9) |
|
4.5.1 Cowrie - A Brief Introduction |
|
|
75 | (1) |
|
4.5.2 A Quick Run of Cowrie (Docker) |
|
|
76 | (1) |
|
4.5.3 Understanding Cowrie Configurations |
|
|
76 | (3) |
|
4.5.4 Cowrie Deployment (Using Docker) |
|
|
79 | (1) |
|
4.5.5 Steps to Deploy Cowrie |
|
|
80 | (2) |
|
4.5.6 What is in the Logs? |
|
|
82 | (2) |
|
4.6 Configuring and Deploying Glastopf Honeypot |
|
|
84 | (4) |
|
4.6.1 Glastopf-A Brief Introduction |
|
|
84 | (1) |
|
4.6.2 Glastopf Installation Steps |
|
|
84 | (1) |
|
4.6.3 Converting Glastopf Event Log Database to Text Format for Ingestion in Log Management Platform `Splunk' |
|
|
85 | (3) |
|
4.7 Creating Central Log Management Facility and Analytic Capability |
|
|
88 | (15) |
|
|
88 | (1) |
|
4.7.2 Installing and deploying Splunk |
|
|
88 | (5) |
|
4.7.3 Enabling Log Forwarding to Facilitate Centralized Log Management |
|
|
93 | (2) |
|
4.7.4 Real-Time Dashboards with Splunk for Threat Intelligence |
|
|
95 | (8) |
|
4.8 Behavioral Analysis of Honeypot Log Data for Threat Intelligence |
|
|
103 | (6) |
|
4.8.1 Building the Intuition |
|
|
103 | (1) |
|
4.8.2 Creating Relevant Features from Logs |
|
|
104 | (1) |
|
4.8.3 Creating Attacker Profiles |
|
|
104 | (5) |
|
|
109 | (1) |
|
|
109 | (2) |
|
5 Collating Threat Intelligence for Zero Trust Future Using Open-Source Tools |
|
|
111 | (22) |
|
|
Siva Suryanarayana Nittala |
|
|
|
|
112 | (2) |
|
|
112 | (2) |
|
|
114 | (2) |
|
5.3 How to Deploy a T-Pot Honeypot |
|
|
116 | (10) |
|
5.3.1 Steps for Installation |
|
|
116 | (2) |
|
5.3.2 T-Pot Installation and System Requirements |
|
|
118 | (1) |
|
5.3.3 System Requirements |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (5) |
|
|
126 | (3) |
|
5.5 Check out your dashboard and start analyzing |
|
|
129 | (4) |
|
|
133 | (58) |
|
6 Malware Analysis Using Machine Learning |
|
|
135 | (32) |
|
|
|
|
|
|
|
135 | (9) |
|
|
137 | (1) |
|
6.1.2 What Does Malware Do? |
|
|
137 | (2) |
|
6.1.3 What are Various Types of Malware Analysis? |
|
|
139 | (1) |
|
6.1.4 Why Do We Need Malware Analysis Tool? |
|
|
140 | (1) |
|
6.1.5 How Will This Tool Help in Cybersecurity? |
|
|
141 | (2) |
|
6.1.6 Why Do We Need Large Dataset for Malware Analysis and Classification? |
|
|
143 | (1) |
|
6.2 Environment Setup for Implementation |
|
|
144 | (4) |
|
6.3 Use of Machine Learning in Malware Analysis |
|
|
148 | (15) |
|
6.3.1 Why Use Machine Learning for Malware Analysis? |
|
|
148 | (1) |
|
6.3.2 Which Machine Learning Approach is Used in Tool Development? |
|
|
149 | (3) |
|
6.3.3 Why Do We Need Features? |
|
|
152 | (1) |
|
6.3.4 What is Feature Extraction? |
|
|
153 | (1) |
|
6.3.5 What is Feature Selection? |
|
|
153 | (1) |
|
6.3.6 Using Machine Learning for Feature Selection |
|
|
154 | (4) |
|
6.3.7 How to Train the Machine Learning Model? |
|
|
158 | (1) |
|
6.3.8 How to Train Machine Learning Model in Python? |
|
|
159 | (1) |
|
6.3.9 How Much Data Shall be Used for Training and for Testing? |
|
|
159 | (3) |
|
6.3.10 How to Use the Machine Learning Model? |
|
|
162 | (1) |
|
|
163 | (2) |
|
|
165 | (2) |
|
7 Feature Engineering and Analysis Toward Temporally Robust Detection of Android Malware |
|
|
167 | (24) |
|
|
|
|
|
|
168 | (2) |
|
|
170 | (2) |
|
|
172 | (15) |
|
|
172 | (2) |
|
7.3.2 Feature Extraction and Selection |
|
|
174 | (13) |
|
|
187 | (1) |
|
|
187 | (2) |
|
|
189 | (2) |
|
III Tools for Vulnerability Assessment and Penetration Testing |
|
|
191 | (54) |
|
8 Use ModSecurity Web Application Firewall to Mitigate OWASP's Top 10 Web Application Vulnerabilities |
|
|
193 | (44) |
|
|
|
|
|
193 | (5) |
|
8.1.1 Defense-in-Depth Security Architecture |
|
|
194 | (2) |
|
8.1.2 ModSecurity Overview |
|
|
196 | (1) |
|
8.1.3 What Can ModSecurity Do? |
|
|
196 | (2) |
|
8.2 Design and Implementation |
|
|
198 | (32) |
|
8.2.1 Docker Essentials: A Developer's Introduction |
|
|
198 | (3) |
|
|
201 | (4) |
|
8.2.3 Setting Up ModSecurity With Nginx Using Docker |
|
|
205 | (7) |
|
8.2.4 ModSecurity Custom Security Rules |
|
|
212 | (1) |
|
8.2.5 Monitoring ModSecurity and Nginx Logs using Elastic Stack |
|
|
213 | (17) |
|
|
230 | (4) |
|
8.4 Recommendations and Future Work |
|
|
234 | (1) |
|
|
235 | (2) |
|
9 Offensive Security with Huntsman: A concurrent Versatile Malware |
|
|
237 | (8) |
|
|
|
237 | (1) |
|
|
237 | (1) |
|
9.2.1 Unique Features of Huntsman |
|
|
237 | (1) |
|
|
238 | (2) |
|
|
240 | (1) |
|
9.5 Functions of Huntsman |
|
|
240 | (4) |
|
9.5.1 Fast Concurrent Port Scanning |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
Bibliography |
|
245 | (6) |
Index |
|
251 | (2) |
About the Editors |
|
253 | |