Skip to Content
Mastering FreeBSD and OpenBSD Security
book

Mastering FreeBSD and OpenBSD Security

by Paco Hope, Bruce Potter, Yanek Korff
March 2005
Beginner to intermediate content levelBeginner to intermediate
464 pages
17h 6m
English
O'Reilly Media, Inc.
Content preview from Mastering FreeBSD and OpenBSD Security

Chapter 9. Intrusion Detection

This is the greatest case of false advertising I’ve seen since I sued the movie The Never Ending Story.

—Lionel Hutz The Simpsons

Your network is firewalled, your servers are locked down, and you feel good about the defensive posture of your environment. However, you do not yet have any idea about the actual attacks being launched against your systems. Are evil hackers using automated tools to scan your network and inventory all your services? Are malicious internal users attempting to break into your severs using known vulnerabilities to commit insider fraud? If they are, are they succeeding?

In order to find out the answers to these questions, you may turn to an Intrusion Detection System (IDS). An IDS is, at its most basic level, a program or host that looks for signs that a resource is being attacked.

No Magic Bullets

While deploying an IDS may seem like a good idea, there are some pitfalls that you should be aware of. It’s common to set up an IDS within an environment only to find out that its not as useful or efficient as you imagined it would be.

Monitoring an IDS

An IDS is no good in a vacuum. It’s a passive system that monitors traffic and can alert a user when an attack is detected. Unlike a firewall that actively drops or rejects traffic, an IDS only analyzes the traffic it receives. At some point, a human needs to be involved in the monitoring activities of an IDS to make it useful. It’s a bit like the old adage “if a tree falls in the woods ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Linux Server Security, Second Edition

Linux Server Security, Second Edition

Michael D. Bauer

Publisher Resources

ISBN: 0596006268Errata Page