427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet145/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   141   142   143   144   145   146   147   148   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
172
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 172


Tripwire
Tripwire is an integrity management tool that was originally created by
Professor Eugene Spafford and Gene Kim in 1992 at Purdue University,
though the project is no longer supported there. In 1997, Gene Kim
cofounded Tripwire Inc. (www.tripwire.com) to develop the product com-
mercially, and the company continues to be a leading player in commercial
change-auditing software for the enterprise, monitoring changes and feeding
reports through enterprise management systems. However, the Open Source
Tripware project at Sourceforge (http://sourceforge.net/projects/tripwire/) is
based on code contributed by Tripwire Inc. in 2000 and is released under
Gnu General Public License (GPL), so there is a clear line of succession from
the original academic source release (ASR). See www.cerias.purdue.edu/
about/history/coast/projects/ for more on the origins of Tripwire at
Computer Operations Audit and Security Technology (COAST).
The original product has been described as an integrity-monitoring tool,
using message digest algorithms to detect changes in files.This is under the
assumption that such changes are likely to be due to illegal access by an
intruder or malicious software. Although it was originally intended for UNIX
systems and is widely used on Linux systems, Mac OS X, and so forth, it has
been ported commercially to other platforms, notably Windows. Open Source
Tripwire, however, is available only for POSIX-compliant platforms and has a
more restricted range of signing options, for example.The commercial
product range is nearer an integrated integrity management system.
Tripwire is also sometimes claimed to be an intrusion detection system. In
a general sense, it is, though the tripwire detection concept is strictly reactive.
It can tell you that there’s been a change that might be due to malicious
action, but only once the change has been made.
The idea is to create a secure database (ideally kept on read-only media)
of file “signatures.” In the midst of discussion about attack signatures, this use
of the term 
signature
might be confusing. It doesn’t refer here to attack signa-
tures, the usual use of the term in intrusion detection. Instead, it refers to a set
of encoded file and directory attribute information called a 
digital signature
.
The information is captured as a “snapshot” when the system is in a presumed
clean state, the “signature” is in the form of a CRC, or cryptographic
checksum.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   141   142   143   144   145   146   147   148   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish