Practical Unix & Internet Security, 3rd Edition
| Another proactive approach to defending a Unix host is to monitor it for suspicious activity and take action when any is detected . An intrusion detection system (IDS) is a program (or set of programs) designed to monitor the system and report or respond to untoward activity. An IDS can monitor activity on a single host, activity on multiple hosts , or activity on a network. An IDS can characterize an activity as suspicious either because it is anomalous ( differs from a user 's usual activity) or because it matches a set of known characteristics of system misuse (or attack).
Arguably, you should run host-based IDS software on every Unix host that you maintain. Network-based IDS software works best when run on network gateways and other hosts that serve as critical network nodes. Running an NIDS outside your firewall will reveal how many attack attempts originate from the Internet. Running an IDS inside your firewall is equally important, as it will reveal anomalous activity that originates from within your network or that manages to cross the firewall. Choosing an IDS requires careful consideration of your requirements and the systems on which you plan to run the IDS. In keeping with our attempt to avoid recommending particular third-party software, we don't provide a list of intrusion detection systems. The SANS Institute, however, maintains an excellent Intrusion Detection FAQ at http://www.sans.org/resources/idfaq that we highly recommend. Running an IDS can be an eye-opening experience. You will soon discover just how many attacks are directed at your systems. It then becomes your responsibility to act on the information you receive; an IDS that's ignored is useless. |