A computer components & hardware forum. HardwareBanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » HardwareBanter forum » General Hardware & Peripherals » Homebuilt PC's
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

Detecting Intruders on Your System Is Fun and Easy



 
 
Thread Tools Display Modes
  #1  
Old December 11th 07, 02:25 PM posted to alt.comp.hardware.pc-homebuilt
[email protected]
external usenet poster
 
Posts: 2
Default Detecting Intruders on Your System Is Fun and Easy

Detecting Intruders on Your System Is Fun and Easy

Well, perhaps the title of this chapter is a slightly misleading.
Supposedly, becoming an

intruder is fun and easy, too. If you want to detect intruders, you
should know what type of

system resources can be depended on for providing evidence. Should you
want to become an

intruder, you ought to know how commercial IDSs look for traces of
your activity.

Scanners are designed to take a look at your system and to let you
know whether you have

configuration problems or holes that can be used for attacks. If your
system was previously

set up in a secure fashion, and an intruder has altered this
configuration, a scanner will

detect this change (when you run the scan) and notify you of the
problem.

System-level intrusion detection tools differ from scanners in a
couple of ways. If the IDS

runs in real time, it can let you know the instant a compromise has
occurred. Also, if the

monitor gathers its data by reading an activity stream on the system,
it can detect a range

of features that a single scanner cannot. For example, scanners will
not tell you that

someone just entered three bad passwords and exceeded the failed login
threshold.

By the time you finish this chapter, you will understand the
following:

* How to classify attacks according to how they originate and the
threat they pose
* The pros and cons of different data sources that a system monitor
can use for decisions
* What system monitors can and cannot detect
* The tradeoffs you may need to make for monitoring your systems in
real time
* What it takes to really track someone through a network
As you will soon see, you need to consider a number of issues when
trying to build a

system-level IDS.

You can see the complate articles at http://www.network.79br.com
  #2  
Old December 11th 07, 05:46 PM posted to alt.comp.hardware.pc-homebuilt
johns
external usenet poster
 
Posts: 658
Default Detecting Intruders on Your System Is Fun and Easy

Too much jargon. This stuff is worthless unless it
can be understood by those who need it. I want
something that pops up and says, "Joe Blow just
tried to access your computer. He lives at 1125
Main Street, and he is a fat dateless pig. Attached
is a jpg of him and his Mommy at Pizza Porker."

johns
  #3  
Old December 11th 07, 08:56 PM posted to alt.comp.hardware.pc-homebuilt
Mephisto
external usenet poster
 
Posts: 9
Default Detecting Intruders on Your System Is Fun and Easy

johns wrote:
Too much jargon. This stuff is worthless unless it
can be understood by those who need it. I want
something that pops up and says, "Joe Blow just
tried to access your computer. He lives at 1125
Main Street, and he is a fat dateless pig. Attached
is a jpg of him and his Mommy at Pizza Porker."

johns


Closest you will get to that is setting up a Honey Pot.
  #4  
Old December 11th 07, 09:26 PM posted to alt.comp.hardware.pc-homebuilt
johns
external usenet poster
 
Posts: 658
Default Detecting Intruders on Your System Is Fun and Easy

Closest you will get to that is setting up a Honey Pot.

You mean put a picture of a hot Chicky-Poo on the
web, and have her auto-reply to the creeps? Good
idea. Start my own TV show.

johns

  #5  
Old December 12th 07, 10:04 AM posted to alt.comp.hardware.pc-homebuilt
Mephisto
external usenet poster
 
Posts: 9
Default Detecting Intruders on Your System Is Fun and Easy

johns wrote:

You mean put a picture of a hot Chicky-Poo on the
web, and have her auto-reply to the creeps? Good
idea. Start my own TV show.

johns


Sort of. It's a program you run that makes it look like your PC is open
to hackers but it is really capturing everything they do and their IP
address etc. Some companies use a type of honey pot that lets them break
into a virtual OS so the real OS is never touched.
 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Detecting Intruders on Your System Is Fun and Easy [email protected] General 1 December 11th 07 09:39 PM
Detecting Intruders on Your System Is Fun and Easy [email protected] Asus Motherboards 0 December 11th 07 03:15 PM
Detecting Intruders on Your System Is Fun and Easy [email protected] Storage (alternative) 0 December 11th 07 03:14 PM
Detecting Intruders on Your System Is Fun and Easy [email protected] Printers 0 December 11th 07 02:45 PM
Not detecting CD-R and CD-RW Rich Cdr 4 July 14th 03 05:52 AM


All times are GMT +1. The time now is 09:02 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2022, Jelsoft Enterprises Ltd.
Copyright 2004-2022 HardwareBanter.
The comments are property of their posters.