当前位置:网站首页>Host based intrusion system IDS
Host based intrusion system IDS
2022-07-03 17:03:00 【Brother Xing plays with the clouds】
experiment Linux platform CentOS System
Application background : As system administrator , They need a security mechanism , For example, the mechanism of detecting file tampering
What exactly does it detect ? The contents of the document 、 File properties
AIDE: The abbreviation of advanced intrusion detection system
How can it be achieved :AIDE By scanning the surface, one is tampered linux The server File system to build file attribute database
take The server File attributes and database conversion , Warn the index of the modified file !
You can see from above :ADIE The initial installation of must keep the data ‘ clean ’
After the system is installed , And no services are exposed on the Internet or even on the LAN
step : After installing the system ----- Broken net ------ Install at the terminal AIDE service ------ To configure
install The server End software aide
# yum install aide
Default profile /etc/aide.conf
The main protection rules in the configuration file are :FIPSR NORMAL DIR DATAONLY
FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256
jurisdiction :p The index node :i Link number :l user :u
Group :g size :s Modification time :m Creation time :c
ACL:acl SELINUX:selinux xattrs:xattr
SHA256/SHA512 Monitoring and (sh256 and sh 512)
Exclamation point before entry ! tell ADIE Ignore subdirectories or directory files
First run AIDE
Initialize first ADIE database
aide --init
according to /etc/side.conf Generated by configuration file /var/lib/aide/aidedb.new.gz The file needs to be renamed /var/lib/aide/aidedb.gz
First proofreading
# aide Run this command directly , If there are no parameters, it defaults to check Options
to update AIDE database
# aide --update
thank you ~~~~~
边栏推荐
- [2. Basics of Delphi grammar] 1 Identifiers and reserved words
- 深入理解 SQL 中的 Grouping Sets 语句
- function overloading
- Mysql database DDL and DML
- 【剑指 Offer】58 - II. 左旋转字符串
- 汇编实例解析--实模式下屏幕显示
- IL Runtime
- What is the material of sa302grc? American standard container plate sa302grc chemical composition
- How to allow remote connection to MySQL server on Linux system?
- HP 阵列卡排障一例
猜你喜欢
IDEA-配置插件
Thread pool executes scheduled tasks
One brush 149 force deduction hot question-10 regular expression matching (H)
跨境电商:外贸企业做海外社媒营销的优势
CC2530 common registers for serial communication
Free data | new library online | cnopendata complete data of China's insurance intermediary outlets
What is the pledge pool and how to pledge?
Kotlin学习快速入门(7)——扩展的妙用
MySQL converts comma separated attribute field data from column to row
PHP online confusion encryption tutorial sharing + basically no solution
随机推荐
One brush 142 monotone stack next larger element II (m)
数据分析必备的能力
What material is 12cr1movr? Chemical property analysis of pressure vessel steel plate 12cr1movr
智慧之道(知行合一)
What material is sa537cl2 equivalent to in China? Sa537cl2 corresponding material
Build your own website (23)
C语言字符串练习
手把手带你入门 API 开发
Apache服务挂起Asynchronous AcceptEx failed.
CC2530 common registers for watchdog
Kotlin学习快速入门(7)——扩展的妙用
27. Input 3 integers and output them in descending order. Pointer method is required.
One brush 148 force deduction hot question-5 longest palindrome substring (m)
NLP four paradigms: paradigm 1: fully supervised learning in the era of non neural networks (Feature Engineering); Paradigm 2: fully supervised learning based on neural network (Architecture Engineeri
word 退格键删除不了选中文本,只能按delete
在iptables防火墙下开启vsftpd的端口
How to judge the region of an IP through C?
The most complete postman interface test tutorial in the whole network, API interface test
Execute script unrecognized \r
SVN完全备份svnadmin hotcopy