[2635] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Monitoring logs

daemon@ATHENA.MIT.EDU (Adam Shostack)
Thu Aug 15 21:42:55 1996

From: Adam Shostack <adam@homeport.org>
To: tauzell@math.umn.edu (David Tauzell)
Date: Thu, 15 Aug 1996 19:59:34 -0500 (EST)
Cc: www-security@ns2.rutgers.edu
In-Reply-To: <Pine.GSO.3.93.960815092512.11627A-100000@birch.math.umn.edu> from "David Tauzell" at Aug 15, 96 09:26:10 am
Errors-To: owner-www-security@ns2.rutgers.edu

David Tauzell wrote:
| What kinds of things to people look for when monitoring logs for security
| breaches?

The unexpected stuff, of course.  :)

Seriously though, the correct answer is not to look for stuff, but to
filter out the expected.  This can take a little tweaking of perl
regexps.  However, the benefit is that the new attack log messages
show up in your logs, since they're unlikely to result in something
that you're filtering.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume


home help back first fref pref prev next nref lref last post