10.5.5. Intrusion detection
Intrusion Detection Systems are designed to catch what might
have gotten past the firewall. They can either be designed to catch
an active break-in attempt in progress, or to detect a successful
break-in after the fact. In the latter case, it is too late to
prevent any damage, but at least we have early awareness of a
problem. There are two basic types of IDS: those protecting
networks, and those protecting individual hosts.
For host based IDS, this is done with utilities that monitor the
file system for changes. System files that have changed in some
way, but should not change, are a dead give-away that something is
amiss. Anyone who gets in and gets root access will presumably make
changes to the system somewhere. This is usually the very first
thing done, either so he can get back in through a backdoor, or to
launch an attack against someone else, in which case, he has to
change or add files to the system. Some systems come with the
tripwire monitoring system, which is
documented at the
Tripwire Open Source Project website.
Network intrusion detection is handled by a system that sees all
the traffic that passes the firewall (not by portscanners, which
advertise usable ports).
Snort is an Open Source example of such a program.
Whitehats.com features an open Intrusion detection database,
arachNIDS.