 
 
 
 
 
   
 Next: Network data
 Up: Intrusion Detection 101
 Previous: Taxonomy
- Host-based audit trails
- application and system logs, file attributes, syscall/process monitoring, kernel
audit facilities
 
 
- Example systems
- tripwire/synctree, swatch/logsurfer/Axent ITA, Solaris BSM post-processing IDSs
 
 
- Problems 
- can't trust audit trail from a compromised host - but cryptography can help
[SK98]
- performance impact of active monitoring on target systems
- practical enterprise deployment?
 
Dug Song
1999-09-17