在Debian系統中,入侵檢測可以通過多種工具和方法實現。以下是一些常見的步驟和工具:
sudo apt update
sudo apt install ufw
sudo ufw enable
sudo ufw allow 22/tcp # 允許SSH連接
sudo ufw deny 23/tcp # 拒絕Telnet連接
sudo ufw status verbose
sudo apt update
sudo apt install fail2ban
/etc/fail2ban/jail.local
文件來添加自定義規則:sudo nano /etc/fail2ban/jail.local
添加以下內容:[DEFAULT]
bantime = 600
findtime = 600
maxretry = 3
[ssh]
enabled = true
port = ssh
filter = sshd
logpath = /var/log/auth.log
maxretry = 3
sudo systemctl start fail2ban
sudo systemctl enable fail2ban
sudo apt update
sudo apt install snort
/etc/snort/snort.conf
文件來配置規則和輸出:sudo nano /etc/snort/snort.conf
可以使用默認規則集,或者下載自定義規則集:sudo apt install snort-custom-rules
sudo systemctl start snort
sudo systemctl enable snort
sudo apt update
sudo apt install suricata
/etc/suricata/suricata.yaml
文件來配置規則和輸出:sudo nano /etc/suricata/suricata.yaml
可以使用默認規則集,或者下載自定義規則集:sudo apt install suricata-custom-rules
sudo systemctl start suricata
sudo systemctl enable suricata
sudo apt update
sudo apt install iptables iptables-persistent
sudo iptables -A INPUT -p tcp --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
sudo iptables -A OUTPUT -p tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT
sudo iptables -A OUTPUT -p tcp --sport 80 -m state --state ESTABLISHED -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 443 -m state --state NEW,ESTABLISHED -j ACCEPT
sudo iptables -A OUTPUT -p tcp --sport 443 -m state --state ESTABLISHED -j ACCEPT
sudo iptables -P INPUT DROP
sudo iptables -A INPUT -j LOG --log-prefix "IPTables-Dropped: " --log-level 4
sudo netfilter-persistent save
sudo netfilter-persistent reload
sudo journalctl -u netfilter-persistent -f
通過上述步驟,你可以在Debian系統中配置入侵檢測系統,以提高系統的安全性。