LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-10-2016, 11:46 AM   #1
danmartinj
Member
 
Registered: Oct 2009
Posts: 117

Rep: Reputation: 1
Linux IDS Threshold Configuration Question


Hello Everyone,

I am trying to learn best practice settings for IDS's. Currently I am working with Linux Suricata IDS and one of the configuration files is a "threshold.config" file. Simply running the IDS without any thresholds set causes log files to continuously run and it's hard to flag potentially serious threats with so many false positives. I noticed I can set thresholds to only flag when the same issue is detected several times within a time interval.

Are there any best practices or ideal configurations when it comes to setting up thresholds so when the IDS goes off there are better chances it actually caught something nefarious going down?

Thanks in advance,

Joe
 
Old 02-10-2016, 12:57 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
If running the IDS results in logs filling quickly then I'd think you better first tune your rule sets to what services you actually offer?..
 
Old 02-11-2016, 09:41 PM   #3
JJJCR
Senior Member
 
Registered: Apr 2010
Posts: 2,150

Rep: Reputation: 449Reputation: 449Reputation: 449Reputation: 449Reputation: 449
Agree with unSpawn, just monitor the ports or services that the system is using.
 
Old 02-12-2016, 01:01 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
I would phrase that differently: given common ways systems get root-compromised there are key areas you want to monitor, most of which will contain (root-owned) directories containing system binaries, libraries and configuration files. *And since you chose Samhain (good choice IMHO) ensure you use its inotify feature.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Snort IDS Setup and Configuration MrTuxor Linux - Security 2 04-20-2013 04:28 AM
A question about pci ids... trist007 Linux - Newbie 2 02-22-2011 01:45 PM
IDS question/opinion linux/snort vs commercial solution josephw47 Linux - Networking 3 10-12-2010 12:48 PM
IDS question/opinion josephw47 Linux - Networking 2 10-10-2010 08:32 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:13 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration