LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Software
User Name
Password
Linux - Software This forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.

Notices


Reply
  Search this Thread
Old 04-04-2008, 01:28 AM   #1
lonelyfloyd
LQ Newbie
 
Registered: Apr 2008
Posts: 5

Rep: Reputation: 0
System call tracing for IDS .... how????


Guys i wanna know hw i can trace system calls for a running process like say sendmail and hand it over to a C program for analysis i.e comapring it with a databse of normal behaviour to aid intrusion detection .

I vil appreicate if u ppl reply

Thanks


Floyd
 
Old 04-04-2008, 03:30 AM   #2
Valery Reznic
ELF Statifier author
 
Registered: Oct 2007
Posts: 676

Rep: Reputation: 137Reputation: 137
strace ?

Valery
 
Old 04-04-2008, 05:58 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Behavioural analysis support for GNU/Linux sounds cool and I'm not aware there's such a product already for this. Strace should work OK but that's userland, a bit unwieldy and doesn't allow you to deny/grant access. I think hooking into the kernel could be "better" performance-wise and because you then also have the means to deny or grant access. IMHO one of the (easiest understandable and configurable) examples of a userland/kernel combo logging and denying syscalls would be Syscalltrace. It's kernel 2.4-only but IIRC Kprobes and the Linux Trace Toolkit both cover 2.4 and 2.6. Maybe it's not bad also to look at other approaches for doing deny/grants like GRSecurity's RBAC and SELinux. Maybe hooking into the LSM ain't a bad idea. Should save time since the framework is already there.

Now for a bit of a downer. In the other thread (the one I didn't close) you state you're "workin on a Host-based IDS". In this thread you're basically asking how such a HIDS would function. I'm getting the idea this may be an assignment of sorts. Is it?
 
Old 04-05-2008, 12:05 PM   #4
lonelyfloyd
LQ Newbie
 
Registered: Apr 2008
Posts: 5

Original Poster
Rep: Reputation: 0
No , im actually workin on a prject HIDS , i've been struggling hard to find a tool which will allow me to intercept system calls of a running process and then analyse them , so that i can compare them with a database of normal behaviour .

Thanks a lot for da advice . I will definitely try out da stuff .
 
  


Reply

Tags
ids, security, tracing



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
tracing 'create' system call called by any process to kernel viv_nan Linux - General 3 03-07-2007 11:09 AM
Tracing system calls of sendmail sOldFiSh Programming 2 11-30-2005 02:34 PM
Tracing the system calls arunachalam Linux - Software 2 09-24-2005 02:41 AM
How to setup a bug tracing system cyu021 Linux - Software 2 09-14-2005 08:30 PM
tracing the error code returned by wait call lg3 Linux - Software 0 02-21-2005 03:53 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Software

All times are GMT -5. The time now is 11:20 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration