Chapter 17. Scanning Your System for Anomalies

   


The previous chapter looked at ways to continuously monitor the system for problems; here you design periodic scans to find problems. The difference is that some things can be done continuously without significant system or human overhead. Other items have too much overhead to do continuously. You probably have some additional ideas that will be helpful. Certainly, Tripwire is very helpful but on a system with many changing files, cracker-induced changes can be lost among expected changes.

The topics covered in this chapter include:

  • "Finding Suspicious Files" on page 645

  • "Tripwire" on page 649

  • "Detecting Deleted Executables" on page 655

  • "Detecting Promiscuous Network Interface Cards" on page 656

  • "Finding Promiscuous Processes" on page 660

  • "Detecting Defaced Web Pages Automatically" on page 661


       
    Top


    Real World Linux Security Prentice Hall Ptr Open Source Technology Series
    Real World Linux Security Prentice Hall Ptr Open Source Technology Series
    ISBN: N/A
    EAN: N/A
    Year: 2002
    Pages: 260

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net