53
edits
Changes
no edit summary
<h1> <span class="mw-headline">Intrusion Detection</span></h1>
<dl><dd><ul><li>Students will learn how to routinely check a computer system's performance (one of the side-effects of system intrusion). Students will specifically check log files in order to detect intrusion activity.
</li></ul>
</dd></dl>
<br>
<ol><li>Check the <b>computer's performance</b> for indications of computer system intrusion activity.</li>
<li><b>Monitor log files</b> (in Linux) to detect any suspected system intrusions.</li>
<p><br>
</p>
<ul>
<li> <b>SATA Hard Disk</b> (in removable disk tray).
<p><br>
</p>
</li></ul>
<p><br>
</p>
<ul>
<li><a href="[https://www.sans.org/media/score/checklists/ID-Linux.pdf" target="_new">Intrusion Discovery (Linux)</a>]</li> <li><a href="[http://help.ubuntu.com/community/LinuxLogFiles" target="_new">Using Syslog Files (Linux)</a>]</li> <li><a href="[http://en.wikipedia.org/wiki/Open_Source_Tripwire" target="_new">Tripwire Definition</a>]</li> <li><a href="[http://sourceforge.net/projects/tripwire/" target="_new">Download Tripwire</a>]</li> <li><a href="[http://www.thegeekstuff.com/2008/12/tripwire-tutorial-linux-host-based-intrusion-detection-system/" target="_new">Using Tripwire</a></li> <li><a href="" target="_new">Online Linux Manpages</a>]</li>
</ul>
<p><br>
</p>
<ul>
<li><a href="[http://cs.senecac.on.ca/%7Efac/sec520/slides/sec520_w9_l1.odp" target="_new">odp</a> ] | <a href="[http://cs.senecac.on.ca/%7Efac/sec520/slides/sec520_w9_l1.pdf" target="_new">pdf</a> ] | <a href="[http://cs.senecac.on.ca/%7Efac/sec520/slides/sec520_w9_l1.ppt" target="_new">ppt</a> ] (Slides: Intrusion Detection)</li>
</ul>
<p><br>
</p>
<br />
Usually system administrators continually monitor thier computer systems to check for reductions in system performance. These "monitoring checks" can be <b>benchmark programs</b> (or operating system commands) to identify system performance. Reduced system performance may be an indicator of an intrusion by a malicious hacker.<br /><br />In this lab, we will issue several Linux commands to help monitor to monitor a Linux system's performance.<br />
<br />
INSTRUCTIONS:
<br /><br />
<br />
Checking for unusual activity in a Linux system focuses of several key indicators:
<li>Issue the Linux commands:<br />
<pre>
</pre>
How does the information from this listing differ from the previous Linux command that you issued?<br />What sort of services/processes might indicate a problem?<br /><br /></li>
<li>Issue the following Linux commands:
<pre>
</pre>
What sort of network usage would indicate an intrusion problem?<br /><br /></li>
<li>Issue the following Linux commands: <pre>
</pre>
What is the purpose of these commands, and how would you check the results for intrusion?<br /><br /></li>
<li>Next, look for unusual files by using the following Linux commands:
<pre>
</pre>
Write these commands in your lab log-book and give a brief purpose of how they can be used to interpret system intrusion.<br /><br /></li>
</p>
<br /><br />
<br>
In this section, you will learn how to configure the <b>Syslog File</b> in
INSTRUCTIONS:
<ol>
<li>Read the article on Linux Log Files: <a href="[https://help.ubuntu.com/community/LinuxLogFiles" target="_new">Linux Log Files</a>]</li>
<li>In your hardened Linux server, experiment with each of the log files
mentioned in the article above (including configuration files). Note that your system may not have the same services installed, so some of the files may not be there.</li>
<li>What would the following line achieve?
<pre>
</pre><br></li>
<li>What does the following line do?
<pre>
</pre>
<br></li>
</p>
<br><br>
<p><br>
INSTRUCTIONS:
<br><br>
</p><div class="messagebox" style="background-color: #f9f6b7; border: 1px solid #c4c295; color: black; padding: 5px; margin: 1ex 0; min-height: 35px; padding-left: 45px;"><div style="float: left; margin-left: -40px;"><a href="https://scs.senecac.on.ca/wiki/index.php{{Admon/File:35px-Idea.png" class="image" title="Important.png"><img alt="" src="SEC520_Lab_1_files/35px-Idea.png" height="35" border="0" width="35"></a></div><div><b>tip|About Tripwire</b><br>|Tripwire is an optional package during install. Tripwire for earlier releases is available from the RedHat/Fedora Powertools CD in RPM format. Upon installation, it will proceed to scan your entire filesystem to create a default database of what your system looks like. (files and sizes etc) It might take as long as ten minutes to initially scan...</div></div>|}}
<br>
application is not installed, then issue the following command:
<pre>
</pre>
<br />
Alternatively, you can download and install tripwire at the following link:
<br />
<li>Based on instructions in the <b>README.Fedora</b> file<br />
(located in <b>/usr/share/docs/tripwire-2.4.2.2</b> directory)<br />
You are required to issue the following commands to initialize and run the tripwire application (using default settings):
<pre>
# cryptographic key files
# Remember your password phrase
# database file. Note: this process
# may take several minutes to perform
# May take several minutes
</pre>
</ol>
<br>
<br>
<ol>
</p>
<p><b>Arrange evidence for each of these items on your screen, then ask
your instructor to review them and sign off on the lab's completion:</b>
<p><br>
</p>
<ol>