Forwarding), which is the CEF (router's Cisco Express Forwarding feature abbreviation), is used to check for another feature of the packets received on the interface. If the source IP address on the CEF table does not have a route that is consistent with the interface to the receiving packet, the router loses the packet. The beauty of discarding RPF is that it blocks all attacks that disguise the source IP address.1 ) Detection DOS AttackWith the host monitoring system and the IDS system federa
# RPM Packages Drop log rotation information into this directoryInclude/etc/logrotate.d# no packages own wtmp--we'll rotate them here/var/log/wtmp {MonthlyCreate 0664 Root utmpRotate 1} # system-specific logs May is also is configured here.Run Time:[Email protected] log]# RPM-QL logrotate/etc/cron.daily/logrotate/etc/logrotate.conf/etc/logrotate.d/usr/sbin/logrotate/usr/share/doc/logrotate-3.7.4/usr/share/doc/logrotate-3.7.4/changes/usr/share/man/man8/logrotate.8.gz/var/lib/logrotate.status/etc/
and the standard of defense technology. Through protocol analysis, content search, and a variety of preprocessing programs, Snort can detect thousands of worms, vulnerability Exploitation attempts, port scans, and various suspicious behaviors. Note that you need to check the free BASE to analyze the Snort warning.
2. ossec hids: an open-source host-based intrusion detection system that performs log analysis, integrity check, Windows Registry monitor
Distributed Log collection system practice (video tutorial)There are a variety of log collection software, end users do not have the energy, it is impossible to put all the log tools to try again, a lot of enterprise common architecture is shown in 1.650) this.width=650; "title=" 6-22.png "alt=" wkiom1dqesqxi6_faacu4iahwvq586.png-wh_50 "src=" http://s4.51cto.com/ Wyfs02/m00/83/10/wkiom1dqesqxi6_faacu4iahwvq586.png-wh_500x0-wm_3-wmp_4-s_2014670677.png "/>Figure 1 Legacy Log Collection architectur
warn the administrator of the existence of the DOS tool.
Spof RPF (Reverse Path Forwarding), which is used by CEF (Cisco Express Forwarding function for short) to check another characteristic of packets received on the interface. If the source IP address CEF table does not have the same route as the interface pointing to the received data packet, the router will lose the data packet. The magic of dropping RPF is that it blocks all attacks that disguise source IP addresses.
1) DOS attack detecti
follows:
Sep 2310: 16: 14 hostname kernel: iptables icmp-localhost IN = lo OUT = MAC = 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 08: 00 SRC = 127.0.0.1 DST = 127.0.0.1LEN = 84 TOS = 0x00 PREC = 0x00 TTL = 64 ID = 0 df proto = icmp type = 8 CODE = 0 ID = 57148SEQ = 256
The above method is troublesome. The ulog tool can be used to directly broadcast logs to the user State using netlink. In this way, the efficiency is higher. First, install the ulog package. The command is as follows:
# Apt-get
Fool-Operated NagiosTo conserve resources, first install a lower version of the Ossim system on the obsolete machine, and the next step in the WebUI is to turn on the Fool-operated Nagios tour without writing any code and configuration files.1. Set up network Discovery in the left menu. 650) this.width=650; "Name=" image_operate_7151442668266572 "src=" http://s10.sinaimg.cn/mw690/ 001zhpmizy6vyj4etjn09690 "alt=" Operation Nagios "title=" fool-type Ope
2310: 16: 14 hostname kernel: iptables icmp-localhost IN = lo OUT = MAC = 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 08: 00 SRC = 127.0.0.1 DST = 127.0.0.1LEN = 84 TOS = 0x00 PREC = 0x00 TTL = 64 ID = 0 df proto = icmp type = 8 CODE = 0 ID = 57148SEQ = 256
The above method is troublesome. The ulog tool can be used to directly broadcast logs to the user State using netlink. In this way, the efficiency is higher. First, install the ulog package. The command is as follows:
# Apt-get install ulogd
Group: 73120574Shop Address http://product.dangdang.com/23903741.html650) this.width=650; "title=" 4-22-2.jpg "style=" Height:220px;width:168px;float:none; "alt=" Wkiom1czfxndqjpnaab6t7docfw936.jpg "src=" http://s3.51cto.com/wyfs02/M02/7F/4D/ Wkiom1czfxndqjpnaab6t7docfw936.jpg "width=" 386 "height=" 497 "/>"Unix/linux Network log analysis and Traffic monitoring" the 2nd time printingHeavyweight Unix/linux Platform log analysis and Defense Forensics tutorial, 51CTO expert Bo Main, with a value o
highlight is the unix/linux system in the boring technical problems, Through the vivid case shows, each case after reading can let the system administrator has the harvest. You'll never regret reading the book. -- Cao Yali 51CTO Blog editor,51CTO senior Operations Manager, college"Unix/linux Network log analysis and Traffic monitoring" This book takes enterprise network security operations as the background, not only detailed analysis of today's more typical security issues, including DDoS at
application was safe against it, but why let an attacker play around? To block those attacks, we use OSSEC with their active response, which blocks an attacker after 10 invalid attempts.
Thats how our OSSEC rule looks like:
2-Detecting application misuse
Detecting application misuse is very similar to detect attacks. Handle t that in this case the user is not trying to hack us, but use our application in
, where xxx is the absolute path of the CentOS-5.3-i386-bin-DVD.iso file.After mounting, use the tar command to copy all files in the optical drive to the/rice Directory:# Cd/mnt/cdrom# Tar-cf-. | (cd/rice; tar-xvpf -)After the copy is complete, go to the rice directory and click ls-al:# Ls-alDrwxr-xr-x 7 root 6144 03-21.Drwxr-xr-x 4 root 4096 08-12 ..Drwxr-xr-x 2 ossec 407552 03-21 CentOS-Rw-r -- 1 root 112 03-21 23:05. discinfo-Rw-r -- 7 root 212 20
port for the business;
Restricted port access for source IP restrictions;
2. Install Ossec-hids Intrusion Detection Program
Ossec is an open-source intrusion detection system, including log analysis, comprehensive detection, rook-kit detection.
3. Protection against attacks
Protection against a small number of Syn-flood attacks
echo "1″>/proc/sys/net/ipv4/tcp_syn_retries
echo "1″>/proc/sys/ne
of security. Today we will look at the following five most famous intrusion detection systems.
1.Snort: This is an open source IDs that almost everyone loves, which uses flexible rules-based language to describe communication, combining signatures, protocols, and detection methods for abnormal behavior. It has been updated extremely quickly, becoming the most widely deployed intrusion detection technology in the world and a standard for defensive technology. With protocol analysis, content lo
Tags: pythonLearn python for a long time, did not write a script, first a MySQL database query script it.1. To install MYSQLDB first[[Email protected] ~]# pip install Mysql-pythonCollecting Mysql-pythonDownloading Mysql-python-1.2.5.zip (108kB)100% |████████████████████████████████| 112kB 171kb/sBuilding Wheels for collected Packages:mysql-pythonRunning setup.py bdist_wheel for Mysql-python ... doneStored in directory:/root/.cache/pip/wheels/38/a3/89/ec87e092cfb38450fc91a62562055231deb0049a02905
Ossec run after installation, run the following command and throw the wrongCat/opt/ossec/logs/alerts/alerts.logSpecific error-throwing content:* * Alert1468897672.2164786: Mail-Syslog,errors, .Jul + One: -: thelocalhost->/var/log/httpd/Error_logrule:1002(Level2),'Unknown problem somewhere in the system.'[Tue Jul + One: -:50.911154 .] [: ERROR] [PID7373] [Client192.168.129.1:54054] PHP warning:date (): It
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.