官术网_书友最值得收藏!

Getting ready

So, what is it we're getting ourselves into? OSSEC is an acronym for Open Source SECurity Event Correlator. OSSEC monitors systems for events in logfiles and processes on the filesystem through the use of commands and outputs. It decodes the data, extracting valuable information, and analyzes it in context.

As the previous diagram shows, the analysis and correlation is used to generate alerts, either e-mails or logs, or active responses. Active response is a simple framework for running a script or program within the context of the alert. Using active response, we can call a firewall script with the source IP that just failed to log in to our server via SSH.

The functionality of the local profile is identical to that of the server-agent model, except all components function locally. Let's start out with a simple local profile installation.

To install OSSEC from source, you will need only a C compiler available on the system and the superuser access. OSSEC does not require any external libraries and builds its own self-contained binaries to avoid corruption or deception should your server be compromised.

Generally, most Linux/BSD operating systems ship with or have a C compiler available. It's usually the GNU C compiler (GCC). If GCC isn't already installed, you can simply consult your system's package manager to install it on any Linux- or BSD-based systems.

Now the only thing left to prepare is downloading and extracting the source tarball. You can retrieve the proper archive file from http://www.ossec.net/?page_id=19. Download the latest stable release, extract it, and change its directory into the folder created for extracting the archive.

主站蜘蛛池模板: 凤庆县| 台安县| 潍坊市| 白水县| 麻城市| 新建县| 宁蒗| 巴东县| 内丘县| 南召县| 巴马| 临沭县| 裕民县| 三门峡市| 沙河市| 恩平市| 灌南县| 桂平市| 巩留县| 鄂托克前旗| 普洱| 津南区| 集贤县| 上饶县| 湖北省| 辉南县| 龙江县| 和顺县| 隆子县| 云安县| 阳山县| 泗水县| 蛟河市| 连山| 揭西县| 武安市| 新化县| 长子县| 海原县| 扬州市| 三穗县|