90 likes | 375 Views
Host – Based Intrusion Detection. “Working of Tripwire”. Background. Complements ... A Layered Security Approach Firewalls / VPNs Anti-virus Authentication Intrusion Detection System 2. Uses. Intrusion Detection File Integrity Assessment Damage Discovery (Forensics)
E N D
Host – BasedIntrusion Detection “Working of Tripwire”
Background • Complements ... A Layered Security Approach • Firewalls / VPNs • Anti-virus • Authentication • Intrusion Detection System2
Uses • Intrusion Detection • File Integrity Assessment • Damage Discovery (Forensics) • Change / Configuration Management • System Auditing • Policy Compliance
How ‘TripWire’ Software Works Tripwire Reports Baseline Database 1. 3. Current System Tripwire Software 2.
Steps Involved to Setup “TripWire” • Installation • Policy Creation • Generating Reports
A Simple Policy File /etc R # all these files should be read only. /sbin R+12 # but, be extra careful with these. /var/spool/mail/maillog > # this file should only grow
Pros and Cons of “TripWire” Pros : • Complements a layered security approach. • The generated report is small in size. • Running of TripWire is periodical and at the administrator’s discretion. Cons : • Lack of real time capability.
Properties and Services of an OS • Process • Process time • State of process • Number of blocked processes • Number of running processes • Thrashing rate • Memory • Amount of memory used • Address range of the memory used
Properties and Services of an OS • File • File size • File access permissions • Total disk space used • Number of files • IO • Number of IO operations (user, root, process) • Source and destination of IO • Total amount of data exchange between the channels • Bus utilization