[767] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Signs of an Intruder

daemon@ATHENA.MIT.EDU (Jonathan M. Bresler)
Mon Nov 25 17:51:15 1996

To: ids@uow.edu.au
In-Reply-To: Your message of "Thu, 21 Nov 1996 13:34:36 +0100."
             <Pine.GSO.3.93.961121133218.8599D-100000@pilt.online.no> 
Date: Sun, 24 Nov 1996 09:53:37 -0500
From: "Jonathan M. Bresler" <jmb@FRB.GOV>
Reply-To: ids@uow.edu.au

        log to a different host.  preferably one that cannot transmit
onto the network (cut the transmit lead on the cable.  syslog works
thru UDP and does not need or require acknowlegements).

        no reason to bloat the logs that you have to work with.
jmb

>
>I also believe there is some help in using "security through obscurity",
>whereby you place wrapper logs etc. in a logfile where a whole lot of
>irrelevant logging goes too (for example, the ftp xferlog, or somesuch).
>
>...I mean while we are on the issue of "more secure". Nothing is, of 
>course.
>
>Tor.
>
>> 
>> One problem here is that the knowledgable hacker also knows where to 
>> look and will clean up after/during the attack. Therefore wrappers 
>> and secondary logging to an alternate host is a more secure way (note 
>> I say more secure and not secure) of ensuring audit trails are valid.

home help back first fref pref prev next nref lref last post