当前位置:网站首页>Host based intrusion system IDS
Host based intrusion system IDS
2022-07-03 17:03:00 【Brother Xing plays with the clouds】
experiment Linux platform CentOS System
Application background : As system administrator , They need a security mechanism , For example, the mechanism of detecting file tampering
What exactly does it detect ? The contents of the document 、 File properties
AIDE: The abbreviation of advanced intrusion detection system
How can it be achieved :AIDE By scanning the surface, one is tampered linux The server File system to build file attribute database
take The server File attributes and database conversion , Warn the index of the modified file !
You can see from above :ADIE The initial installation of must keep the data ‘ clean ’
After the system is installed , And no services are exposed on the Internet or even on the LAN
step : After installing the system ----- Broken net ------ Install at the terminal AIDE service ------ To configure
install The server End software aide
# yum install aide
Default profile /etc/aide.conf
The main protection rules in the configuration file are :FIPSR NORMAL DIR DATAONLY
FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256
jurisdiction :p The index node :i Link number :l user :u
Group :g size :s Modification time :m Creation time :c
ACL:acl SELINUX:selinux xattrs:xattr
SHA256/SHA512 Monitoring and (sh256 and sh 512)
Exclamation point before entry ! tell ADIE Ignore subdirectories or directory files
First run AIDE
Initialize first ADIE database
aide --init
according to /etc/side.conf Generated by configuration file /var/lib/aide/aidedb.new.gz The file needs to be renamed /var/lib/aide/aidedb.gz
First proofreading
# aide Run this command directly , If there are no parameters, it defaults to check Options
to update AIDE database
# aide --update
thank you ~~~~~
边栏推荐
- Mysql database -dql
- What is the material of 13mnnimor? 13mnnimor steel plate for medium and low temperature pressure vessels
- Take you to API development by hand
- HP 阵列卡排障一例
- Thread pool: the most common and error prone component of business code
- 静态程序分析(一)—— 大纲思维导图与内容介绍
- One brush 149 force deduction hot question-10 regular expression matching (H)
- Deep understanding of grouping sets statements in SQL
- Atom QT 16_ audiorecorder
- What material is 13crmo4-5 equivalent to in China? 13crmo4-5 chemical composition 13crmo4-5 mechanical properties
猜你喜欢

New features of C 10

Redis:关于列表List类型数据的操作命令

ANOVA example

大消费企业怎样做数字化转型?

One brush 149 force deduction hot question-10 regular expression matching (H)

Free data | new library online | cnopendata complete data of China's insurance intermediary outlets

建立自己的网站(23)

CC2530 common registers for ADC single channel conversion

Mysql database DDL and DML

Talk about several methods of interface optimization
随机推荐
PHP production website active push (website)
What material is 13crmo4-5 equivalent to in China? 13crmo4-5 chemical composition 13crmo4-5 mechanical properties
[combinatorial mathematics] recursive equation (example of recursive equation 2 Hanoi Tower | example of recursive equation 3 insertion sequencing)
數據分析必備的能力
Simulink oscilloscope data is imported into Matlab and drawn
[JDBC] API parsing
Deep understanding of grouping sets statements in SQL
The most complete postman interface test tutorial in the whole network, API interface test
汇编实例解析--实模式下屏幕显示
[combinatorics] recursive equation (outline of recursive equation content | definition of recursive equation | example description of recursive equation | Fibonacci Series)
2022.02.14_ Daily question leetcode five hundred and forty
One brush 148 force deduction hot question-5 longest palindrome substring (m)
PHP online confusion encryption tutorial sharing + basically no solution
Bcvp developer community 2022 exclusive peripheral first bullet
MySQL user management
Web crawler knowledge day03
UCORE overview
C language string inversion
Apache服务挂起Asynchronous AcceptEx failed.
Kotlin learning quick start (7) -- wonderful use of expansion