Legal Information
PC Knowledge Base - Signs of Intrusion

Good Knowledge Is Good2Use

Intruders are always looking for new ways to break into networked computer systems. Even if your organisation has implemented comprehensive information security protection measures (such as firewalls), it is essential that you closely monitor your information assets and transactions involving these assets for signs of intrusion. Monitoring may be complicated because intruders often hide their activities by changing the systems they break into.

A general security goal is to prevent intrusions. However, because no prevention measures are perfect, you also need a strategy for handling intrusions that includes preparation, detection, and response. The following focuses on preparation and detection. The practices recommended below are designed to help you prepare for and detect intrusions by looking for unexpected or suspicious behaviour and "fingerprints" of known intrusion methods.
These practices do not cover

If you do not know that an intrusion or an intrusion attempt has occurred, it is difficult, if not impossible, to later determine if your systems have been compromised. If the information necessary to detect an intrusion is not being collected and reviewed, you cannot determine what sensitive data, systems, and networks are being attacked and what breaches in confidentiality, integrity, or availability have occurred. As a result of an inadequate ability to detect signs of intrusion, the following may occur:

The general approach to detecting intrusions is

While this process sounds simple enough, implementing it is a resource-intensive activity that requires continuous, automated support and daily administrative effort. Furthermore, the scale of intrusion detection practices may need to change as threats, system configurations, or security requirements change. In all cases, however, there are five areas that must be addressed.

Adequate preparation, which should include

As you look for signs of intrusion, keep in mind that information from one source may not appear suspicious by itself. Inconsistencies among several sources can sometimes be the best indication of suspicious behaviour or intrusions.

Summary of recommended practices
  1. Establish a policy and procedures that prepare your organisation to detect signs of intrusion.
  2. Identify data that characterise systems and aid in detecting signs of suspicious behaviour.
  3. Manage logging and other data collection mechanisms. Integrity of intrusion detection software
  4. Ensure that the software used to examine systems has not been compromised. Behaviour of networks and systems
  5. Monitor and inspect network activities for unexpected behaviour.
  6. Monitor and inspect system activities for unexpected behaviour.
  7. Inspect files and directories for unexpected changes. Physical forms of intrusion
  8. Investigate unauthorised hardware attached to your organisation's network.
  9. Inspect physical resources for signs of unauthorised access.
  10. Review reports by users and external contacts about suspicious and unexpected behaviour.
  11. Take appropriate actions upon discovering unauthorised, unexpected, or suspicious activity.


Search Knowledge Base Feedback
If you like our web site refer a friend.
Your friends name.
Your friends email address.
Your Name
Your Email Address


© Copyright 1998-1999 GOOD2USE