hiya 

i think that ids is fine..but...

- what do when someon logged in as root on a xdm login screen
        - what do you do next

- what do you do when you detect a port scan...
        - what do you do next

- when your host IDS detects that someone added a rootkit....
        - what do you do next

- what do you do when you detect lots of telnet/ftp/web/ssh/smtp 
  failed connection attempts to your server
        - what do you do next

- when your netowrk IDS detects that 1/2 of the websites being
  viewed is going to "one of those websites"..
        - what do you do next

- when your IDS ( falsely ) says you have an intruder ...
        - what do you do next

- when you or your IDS notice that there is a file with all
  your passwds ...
        - what do you do next

- how important is the data you are trying to proetect ??
        - where else is it kept...

-- you can spend lots of time on IDS...  but what is accomplished
   chasing after false alarms ...
        - a policy that no one loggs in as root elminates lots
        of internal security breaches

-- lots to do... so little time .... when doing for 10-50-100 servers
        - log all traffic to a log file on a loghost server
        ( analyze it later ??
        - "instantly" detect any changes to your root filesystems
        - if someone reboots orloggs in as root...page yourself
        - do a coule trivial things tht renders most script kiddies
          harmless
        - one machine does NOT trust any other... any breaches is
          limited to that one insecure server

have fun
alvin
http://www.Linux-Sec.net/IDS  -- list of IDS apps


On Thu, 20 Sep 2001, Daniel Mester wrote:

> I found big article about IDS.
> http://www.nwc.com/1217/1217f2.html
> _______________________________________________
> Firewalls mailing list
> [EMAIL PROTECTED]
> http://lists.gnac.net/mailman/listinfo/firewalls
> 

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to