Monitoring, Logs, and IDS (Lesson 15) Flashcards
Unix Log Files
syslog – the system log
sulog – records actions to switch users (su)
utmp – keeps track of users currently logged on
wtmp – stores historical data on login, logout, shutdown, and restart events.
lastlog – tracks each user’s most recent login time and the point of origin of the user. Successful and unsuccessful logins can be tracked.
-At login, this information (about the last login) is often displayed
Four major methods attempted to perform intrusion detection:
User Profiling
Intruder Profiling
Signature Analysis
Action-based (attack “signatures”)
User Profiling - Types of activity to record may include
CPU and I/O usage Connect time and time of connection as well as duration Location of use Command usage Mailer usage Editor and compiler usage Directories and files accessed/modified Errors Network activity
Intruder Profiling
When an intruder first gains access the action often taken is to check to see who else is on, will examine files and directories, …
Can also apply to insiders gaining access to files they are not authorized to access.
Signature Analysis
Just as an individual has a unique written signature which can be used for identification purposes, individuals also have a “typing signature”.
This technique requires special equipment.
Variation on this is to watch for certain abbreviations for commands and common errors.
MIDAS
Multics Intrusion Detection and Alerting System
Network Profile
which systems normally connect to which others using what service.
During a 2 month period, 110,000 connections analyzed at UC-Davis, NSM correctly identified over 300 intrusions, only 1% had been detected by admins.
NSM
Network Security Monitor
DIDS
Distributed IDS
CSM
Cooperating Security Monitors
4 General Types of IPS
Inline NIDS
Layer Seven Switches
Application Firewall/IDS
Deceptive Applications
Layer Seven Switch
Due to bandwidth intensive content, some switching now going on a layer seven (e.g. load balancers) where application traffic can be examined.
Decisions can be made as to whether data is sent.
Good for preventing DOS