tailieunhanh - Open Source Security Tools : Practical Guide to Security Applications part 28

Open Source Security Tools : Practical Guide to Security Applications part 28. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page 249 Thursday June 24 2004 9 54 PM Using Databases and Web Servers to Manage Your Security Data 249 This chapter assumes you will be installing ACID on a separate machine from your Snort sensor. Putting them on the same machine is not only a bad idea from a security standpoint but will also bog down your Snort sensor to the point of making it unusable. The box running ACID should preferably be located at a separate site from the Snort sen-sors this makes it harder for someone who hacks a Snort sensor to get to your logs. Figure illustrates the elements of an ACID-Snort IDS. Installing ACID Once you have all the prerequisite programs loaded you can finally install ACID. 1. Get the program file from the book s CD-ROM or download it from the ACID Web site. 2. Place the tar file in your www htdocs directory. Unzip it there and it will create its own directory. Various sensors collect alert data and forward it to a MySQL database. These may be Snort sensors or syslog-enabled devices ACID uses PHP to provide a front-end for querying the database from a Web browser. Figure ACID-Snort Intrusion Detection System Page 250 Thursday June 24 2004 9 54 PM 250 Chapter 8 Analysis and Management Tools 3. Remove the remaining tar file as anything left in your root htdocs directory could be accessed by someone using the Web server. Configuring ACID 1. Change directories to the htdocs www acid directory. 2. Edit the file. The lines starting with slashes and stars represent comments and instructions on how to complete the configuration. The lines starting with are variables and tell the program specific things about your system. 3. Change each of these statements with the parameters for your system. Table lists the variables and information about and recommendations for each entry. Table Variables for Configuring ACID Variable Names Descriptions DBtype The type of database ACID will be using. The default is mysql but you

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.