8.10. Intrusion Detection

8.10.1. IDS and IPS

IDS and IPS are common protection devices. The difference between IPS and IDS is that IPS usually has blocking ability.

8.10.2. Common Intrusion Points

  • web hacking

  • High-risk service intrusion

8.10.3. Monitoring Implementation

8.10.3.1. Client Monitoring

  • Monitor sensitive configuration files

  • Common commands ELF file integrity monitoring
    • ps

    • lsof

  • rootkit monitoring

  • Resource usage alert
    • memory usage

    • CPU usage

    • IO usage

    • network usage

  • Emerging Process Monitoring

  • File monitoring based on inotify

8.10.3.2. Network Detection

Detection is based on network-level attack vectors, such as Snort.

8.10.3.3. Log Analysis

The host system security log/operation log, network device traffic log, Web application access log, SQL application access log and other logs are centralized into a unified background, and various logs are comprehensively analyzed in the background.