![]() |
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Display Modes |
#1
|
|||
|
|||
![]()
Detecting Intruders on Your System Is Fun and Easy
Well, perhaps the title of this chapter is a slightly misleading. Supposedly, becoming an intruder is fun and easy, too. If you want to detect intruders, you should know what type of system resources can be depended on for providing evidence. Should you want to become an intruder, you ought to know how commercial IDSs look for traces of your activity. Scanners are designed to take a look at your system and to let you know whether you have configuration problems or holes that can be used for attacks. If your system was previously set up in a secure fashion, and an intruder has altered this configuration, a scanner will detect this change (when you run the scan) and notify you of the problem. System-level intrusion detection tools differ from scanners in a couple of ways. If the IDS runs in real time, it can let you know the instant a compromise has occurred. Also, if the monitor gathers its data by reading an activity stream on the system, it can detect a range of features that a single scanner cannot. For example, scanners will not tell you that someone just entered three bad passwords and exceeded the failed login threshold. By the time you finish this chapter, you will understand the following: * How to classify attacks according to how they originate and the threat they pose * The pros and cons of different data sources that a system monitor can use for decisions * What system monitors can and cannot detect * The tradeoffs you may need to make for monitoring your systems in real time * What it takes to really track someone through a network As you will soon see, you need to consider a number of issues when trying to build a system-level IDS. You can see the complate articles at http://www.network.79br.com |
#2
|
|||
|
|||
![]()
Too much jargon. This stuff is worthless unless it
can be understood by those who need it. I want something that pops up and says, "Joe Blow just tried to access your computer. He lives at 1125 Main Street, and he is a fat dateless pig. Attached is a jpg of him and his Mommy at Pizza Porker." johns |
#3
|
|||
|
|||
![]()
johns wrote:
Too much jargon. This stuff is worthless unless it can be understood by those who need it. I want something that pops up and says, "Joe Blow just tried to access your computer. He lives at 1125 Main Street, and he is a fat dateless pig. Attached is a jpg of him and his Mommy at Pizza Porker." johns Closest you will get to that is setting up a Honey Pot. |
#4
|
|||
|
|||
![]()
Closest you will get to that is setting up a Honey Pot.
You mean put a picture of a hot Chicky-Poo on the web, and have her auto-reply to the creeps? Good idea. Start my own TV show. johns |
#5
|
|||
|
|||
![]()
johns wrote:
You mean put a picture of a hot Chicky-Poo on the web, and have her auto-reply to the creeps? Good idea. Start my own TV show. johns Sort of. It's a program you run that makes it look like your PC is open to hackers but it is really capturing everything they do and their IP address etc. Some companies use a type of honey pot that lets them break into a virtual OS so the real OS is never touched. |
Thread Tools | |
Display Modes | |
|
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Detecting Intruders on Your System Is Fun and Easy | [email protected] | General | 1 | December 11th 07 09:39 PM |
Detecting Intruders on Your System Is Fun and Easy | [email protected] | Asus Motherboards | 0 | December 11th 07 03:15 PM |
Detecting Intruders on Your System Is Fun and Easy | [email protected] | Storage (alternative) | 0 | December 11th 07 03:14 PM |
Detecting Intruders on Your System Is Fun and Easy | [email protected] | Printers | 0 | December 11th 07 02:45 PM |
Not detecting CD-R and CD-RW | Rich | Cdr | 4 | July 14th 03 05:52 AM |