当前位置:网站首页>Host based intrusion system IDS
Host based intrusion system IDS
2022-07-03 17:03:00 【Brother Xing plays with the clouds】
experiment Linux platform CentOS System
Application background : As system administrator , They need a security mechanism , For example, the mechanism of detecting file tampering
What exactly does it detect ? The contents of the document 、 File properties
AIDE: The abbreviation of advanced intrusion detection system
How can it be achieved :AIDE By scanning the surface, one is tampered linux The server File system to build file attribute database
take The server File attributes and database conversion , Warn the index of the modified file !
You can see from above :ADIE The initial installation of must keep the data ‘ clean ’
After the system is installed , And no services are exposed on the Internet or even on the LAN
step : After installing the system ----- Broken net ------ Install at the terminal AIDE service ------ To configure
install The server End software aide
# yum install aide
Default profile /etc/aide.conf
The main protection rules in the configuration file are :FIPSR NORMAL DIR DATAONLY
FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256
jurisdiction :p The index node :i Link number :l user :u
Group :g size :s Modification time :m Creation time :c
ACL:acl SELINUX:selinux xattrs:xattr
SHA256/SHA512 Monitoring and (sh256 and sh 512)
Exclamation point before entry ! tell ADIE Ignore subdirectories or directory files
First run AIDE
Initialize first ADIE database
aide --init
according to /etc/side.conf Generated by configuration file /var/lib/aide/aidedb.new.gz The file needs to be renamed /var/lib/aide/aidedb.gz
First proofreading
# aide Run this command directly , If there are no parameters, it defaults to check Options
to update AIDE database
# aide --update
thank you ~~~~~
边栏推荐
- Define a structure fraction to represent a fraction, which is used to represent fractions such as 2/3 and 5/6
- LeetCode 1657. Determine whether the two strings are close
- Daily code 300 lines learning notes day 10
- Talk about several methods of interface optimization
- 定义一个结构体Fraction,表示分数,用于表示 2/3, 5/6这样的分数
- [combinatorics] recursive equation (constant coefficient linear homogeneous recursive equation | constant coefficient, linear, homogeneous concept description | constant coefficient linear homogeneous
- Mysql database DDL and DML
- What is the material of sa302grc? American standard container plate sa302grc chemical composition
- NLP四范式:范式一:非神经网络时代的完全监督学习(特征工程);范式二:基于神经网络的完全监督学习(架构工程);范式三:预训练,精调范式(目标工程);范式四:预训练,提示,预测范式(Prompt工程)
- Rsync远程同步
猜你喜欢

NLP四范式:范式一:非神经网络时代的完全监督学习(特征工程);范式二:基于神经网络的完全监督学习(架构工程);范式三:预训练,精调范式(目标工程);范式四:预训练,提示,预测范式(Prompt工程)

ucore概述

Fast Ethernet and Gigabit Ethernet: what's the difference?

Mysql database -dql

New features of C 10

Static program analysis (I) -- Outline mind map and content introduction

Arduino esp32: overall framework of lvgl project (I)

Analysis of variance summary

Recommendation of good books on learning QT programming

关于学习Qt编程的好书精品推荐
随机推荐
[combinatorics] recursive equation (characteristic equation and characteristic root | example of characteristic equation | root formula of monadic quadratic equation)
Solution to long waiting time of SSH connection to remote host
What kind of material is 14Cr1MoR? Analysis of chemical composition and mechanical properties of 14Cr1MoR
新库上线 | CnOpenData中国保险机构网点全集数据
网络安全web渗透技术
CC2530 common registers
聊聊接口优化的几个方法
人生还在迷茫?也许这些订阅号里有你需要的答案!
Free data | new library online | cnopendata complete data of China's insurance intermediary outlets
[JDBC] API parsing
美团一面:为什么线程崩溃崩溃不会导致 JVM 崩溃
比亚迪、长城混动市场再“聚首”
27. Input 3 integers and output them in descending order. Pointer method is required.
Define a structure fraction to represent a fraction, which is used to represent fractions such as 2/3 and 5/6
What is the difference between 14Cr1MoR container plate and 14Cr1MoR (H)? Chemical composition and performance analysis of 14Cr1MoR
The word backspace key cannot delete the selected text, so you can only press Delete
Thread pool: the most common and error prone component of business code
How to judge the region of an IP through C?
Yu Wenwen, Hu Xia and other stars take you to play with the party. Pipi app ignites your summer
Prepare for the golden three silver four, 100+ software test interview questions (function / interface / Automation) interview questions. win victory the moment one raises one 's standard