LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-17-2015, 09:25 AM   #1
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Rep: Reputation: 11
Post HoneyD and Conflict with Suricata-IDS.


Hi.
An IDS can have any conflict with Honeypot?

Tnx
 
Old 01-17-2015, 11:40 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by hack3rcon View Post
An IDS can have any conflict with Honeypot?
Generally speaking any IDS that's used to actively drop packets may conflict, yes. *Note you specifically mention Suricata in your thread title but you don't elaborate. Please do.
 
Old 01-18-2015, 12:10 AM   #3
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
For improve the security you recommended HoneyD or Suricata-IDS?
 
Old 01-18-2015, 03:42 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by hack3rcon View Post
For improve the security you recommended HoneyD or Suricata-IDS?
One of the items is a honeypot the other an IDS. They both have their uses but they are incomparable. To improve security you must first assess what's the current security posture: what's been done auditing and hardening-wise already.
 
Old 01-20-2015, 11:31 PM   #5
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
Quote:
Originally Posted by unSpawn View Post
One of the items is a honeypot the other an IDS. They both have their uses but they are incomparable. To improve security you must first assess what's the current security posture: what's been done auditing and hardening-wise already.
Do you have any idea for hardening a Debian system?
 
Old 01-21-2015, 01:30 AM   #6
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Start at https://www.debian.org/doc/manuals/s...-debian-howto/, then https://benchmarks.cisecurity.org/to...hmark_v1.0.pdf and test locally with GNU/Tiger and from remote with OpenVAS?
 
Old 01-23-2015, 01:14 AM   #7
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
Thanks
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Any Slackers using Suricata? enorbet Slackware 3 09-26-2014 11:10 PM
Installing Suricata leni Linux - Networking 5 09-22-2013 12:39 AM
suricata integrate with iptables niraj.vara Linux - Security 3 04-24-2013 04:32 PM
LXer: Suricata 1.3 released LXer Syndicated Linux News 0 07-10-2012 01:13 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:50 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration