{"id":61568,"date":"2025-04-29T14:33:13","date_gmt":"2025-04-29T06:33:13","guid":{"rendered":"https:\/\/fwq.ai\/blog\/61568\/"},"modified":"2025-04-29T14:33:13","modified_gmt":"2025-04-29T06:33:13","slug":"%e5%a6%82%e4%bd%95%e4%bd%bf%e7%94%a8%e7%bd%91%e5%85%b3ids%e4%bf%9d%e6%8a%a4centos%e6%9c%8d%e5%8a%a1%e5%99%a8%e5%86%85%e9%83%a8%e7%bd%91%e7%bb%9c%e7%9a%84%e5%ae%89%e5%85%a8-2","status":"publish","type":"post","link":"https:\/\/fwq.ai\/blog\/61568\/","title":{"rendered":"\u5982\u4f55\u4f7f\u7528\u7f51\u5173IDS\u4fdd\u62a4CentOS\u670d\u52a1\u5668\u5185\u90e8\u7f51\u7edc\u7684\u5b89\u5168"},"content":{"rendered":"<p>\u5982\u4f55\u4f7f\u7528\u7f51\u5173ids\u4fdd\u62a4centos\u670d\u52a1\u5668\u5185\u90e8\u7f51\u7edc\u7684\u5b89\u5168<\/p>\n<p>\u6458\u8981\uff1a\u968f\u7740\u7f51\u7edc\u653b\u51fb\u7684\u4e0d\u65ad\u589e\u591a\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u5185\u7f51\u5b89\u5168\u53d8\u5f97\u5c24\u4e3a\u91cd\u8981\u3002\u672c\u6587\u5c06\u4ecb\u7ecd\u5982\u4f55\u4f7f\u7528\u7f51\u5173IDS\uff08Intrusion Detection System\uff09\u6765\u4fdd\u62a4CentOS\u670d\u52a1\u5668\u5185\u90e8\u7f51\u7edc\u7684\u5b89\u5168\u3002\u6211\u4eec\u5c06\u901a\u8fc7\u914d\u7f6e\u7f51\u5173IDS\u6765\u76d1\u63a7\u7f51\u7edc\u6d41\u91cf\uff0c\u5e76\u4f7f\u7528\u57fa\u4e8e\u89c4\u5219\u7684\u9632\u706b\u5899\u6765\u963b\u6b62\u6076\u610f\u6d41\u91cf\u8fdb\u5165\u5185\u90e8\u7f51\u7edc\u3002\u6587\u7ae0\u4e2d\u8fd8\u5c06\u5305\u542b\u4e00\u4e9b\u793a\u4f8b\u4ee3\u7801\u6765\u5e2e\u52a9\u8bfb\u8005\u66f4\u597d\u5730\u7406\u89e3\u548c\u5b9e\u65bd\u8fd9\u4e9b\u5b89\u5168\u63aa\u65bd\u3002<\/p>\n<ol>\n<li>\u7b80\u4ecb<br \/>\u7f51\u5173IDS\u662f\u4e00\u79cd\u901a\u8fc7\u76d1\u63a7\u548c\u5206\u6790\u7f51\u7edc\u6d41\u91cf\u6765\u68c0\u6d4b\u548c\u963b\u6b62\u6076\u610f\u6d3b\u52a8\u7684\u7cfb\u7edf\u3002\u5b83\u901a\u8fc7\u76d1\u89c6\u7f51\u7edc\u884c\u4e3a\u548c\u6d41\u91cf\uff0c\u8bc6\u522b\u548c\u62a5\u544a\u53ef\u80fd\u7684\u653b\u51fb\u884c\u4e3a\u3002\u901a\u8fc7\u5c06\u7f51\u5173IDS\u7f6e\u4e8e\u5185\u90e8\u7f51\u7edc\u548c\u5916\u90e8\u7f51\u7edc\u4e4b\u95f4\u7684\u7f51\u5173\u4f4d\u7f6e\uff0c\u6211\u4eec\u53ef\u4ee5\u6709\u6548\u5730\u4fdd\u62a4\u670d\u52a1\u5668\u5185\u7f51\u7684\u5b89\u5168\u3002<\/li>\n<li>\u5b89\u88c5\u548c\u914d\u7f6e\u7f51\u5173IDS<br \/>\u9996\u5148\uff0c\u6211\u4eec\u9700\u8981\u5b89\u88c5\u548c\u914d\u7f6e\u4e00\u4e2a\u7f51\u5173IDS\u8f6f\u4ef6\uff0c\u4f8b\u5982Suricata\u3002Suricata\u662f\u4e00\u4e2a\u529f\u80fd\u5f3a\u5927\u7684\u5f00\u6e90IDS\/IPS\u7cfb\u7edf\uff0c\u5b83\u53ef\u4ee5\u5728CentOS\u670d\u52a1\u5668\u4e0a\u8fd0\u884c\u3002<\/li>\n<\/ol>\n<p>(1) \u5b89\u88c5Suricata\uff1a<br \/>$ sudo yum install epel-release<br \/>$ sudo yum install suricata<\/p>\n<p>(2) \u914d\u7f6eSuricata\uff1a<br \/>$ sudo vi \/etc\/suricata\/suricata.yaml<br \/>\u5728\u914d\u7f6e\u6587\u4ef6\u4e2d\uff0c\u6211\u4eec\u53ef\u4ee5\u901a\u8fc7\u5b9a\u4e49\u89c4\u5219\u96c6\u3001\u542f\u7528\u65e5\u5fd7\u8bb0\u5f55\u3001\u914d\u7f6e\u544a\u8b66\u7b49\u6765\u5b9a\u5236Suricata\u7684\u884c\u4e3a\u3002<\/p>\n<ol>\n<li>\u914d\u7f6e\u9632\u706b\u5899\u89c4\u5219<br \/>\u5728\u7f51\u5173\u4e0a\u914d\u7f6e\u9632\u706b\u5899\u89c4\u5219\u6765\u963b\u6b62\u6076\u610f\u6d41\u91cf\u8fdb\u5165\u670d\u52a1\u5668\u5185\u7f51\u662f\u975e\u5e38\u91cd\u8981\u7684\u3002\u6211\u4eec\u53ef\u4ee5\u4f7f\u7528iptables\u6216nftables\u6765\u5b9e\u73b0\u8fd9\u4e00\u70b9\u3002\u4ee5\u4e0b\u662f\u4e00\u4e2a\u4f7f\u7528iptables\u7684\u793a\u4f8b\uff1a<\/li>\n<\/ol>\n<p>(1) \u521b\u5efa\u4e00\u4e2a\u65b0\u7684iptables\u94fe\uff1a<br \/>$ sudo iptables -N IDS<\/p>\n<p>(2) \u5c06\u7f51\u5173IDS\u7684\u65e5\u5fd7\u6d41\u91cf\u5b9a\u5411\u5230\u8fd9\u4e2a\u94fe\uff1a<br \/>$ sudo iptables -A INPUT -j IDS<\/p>\n<p>(3) \u5728IDS\u94fe\u4e0a\u914d\u7f6e\u89c4\u5219\uff1a<br \/>$ sudo iptables -A IDS -m conntrack &#8211;ctstate ESTABLISHED,RELATED -j ACCEPT<br \/>$ sudo iptables -A IDS -m conntrack &#8211;ctstate INVALID -j DROP<br \/>$ sudo iptables -A IDS -p tcp &#8211;dport 22 -m recent &#8211;name ssh &#8211;set -m comment &#8211;comment &#8220;Allow SSH&#8221;<br \/>$ sudo iptables -A IDS -p tcp &#8211;dport 22 -m recent &#8211;name ssh &#8211;rcheck &#8211;seconds 60 &#8211;hitcount 4 -j DROP<\/p>\n<p>\u4ee5\u4e0a\u89c4\u5219\u7684\u542b\u4e49\u662f\uff1a\u5141\u8bb8\u5df2\u7ecf\u5efa\u7acb\u7684\u548c\u76f8\u5173\u7684\u8fde\u63a5\u901a\u8fc7\uff0c\u4e22\u5f03\u65e0\u6548\u8fde\u63a5\uff0c\u5982\u679c\u6709\u8fde\u7eed4\u6b21SSH\u8fde\u63a5\u572860\u79d2\u5185\u88ab\u89e6\u53d1\uff0c\u5219\u7981\u6b62SSH\u8fde\u63a5\u3002<\/p>\n<ol>\n<li>\u65e5\u5fd7\u5206\u6790\u548c\u62a5\u8b66<br \/>\u8bbe\u7f6e\u7f51\u5173IDS\u53ef\u4ee5\u4ea7\u751f\u5927\u91cf\u7684\u65e5\u5fd7\u3002\u6211\u4eec\u53ef\u4ee5\u901a\u8fc7\u5206\u6790\u8fd9\u4e9b\u65e5\u5fd7\u5e76\u8bbe\u7f6e\u62a5\u8b66\u6765\u53d1\u73b0\u6f5c\u5728\u7684\u653b\u51fb\u6d3b\u52a8\u3002\u4ee5\u4e0b\u662f\u4e00\u4e2a\u4f7f\u7528Python\u811a\u672c\u8bfb\u53d6\u5e76\u5206\u6790Suricata\u65e5\u5fd7\u7684\u4ee3\u7801\u793a\u4f8b\uff1a<\/li>\n<\/ol>\n<pre>import sys\n\nlogfile_path = '\/var\/log\/suricata\/eve.json'\n\ndef analyze_logs():\n    with open(logfile_path, 'r') as logfile:\n        for line in logfile:\n            # \u5728\u8fd9\u91cc\u8fdb\u884c\u65e5\u5fd7\u5206\u6790\u548c\u62a5\u8b66\u7684\u903b\u8f91\n            pass\n\nif __name__ == '__main__':\n    analyze_logs()<\/pre>\n<p>  \u767b\u5f55\u540e\u590d\u5236   <\/p>\n<p>\u901a\u8fc7\u7f16\u5199\u9002\u5f53\u7684\u903b\u8f91\uff0c\u6211\u4eec\u53ef\u4ee5\u68c0\u6d4b\u5230\u5f02\u5e38\u6d41\u91cf\u3001\u6076\u610fIP\u548c\u5176\u4ed6\u6f5c\u5728\u7684\u653b\u51fb\u6d3b\u52a8\uff0c\u5e76\u53ca\u65f6\u53d1\u51fa\u62a5\u8b66\u3002<\/p>\n<ol>\n<li>\u5b9a\u671f\u66f4\u65b0\u89c4\u5219\u96c6\u548c\u8f6f\u4ef6<br \/>\u4e3a\u4e86\u4fdd\u6301\u670d\u52a1\u5668\u5185\u7f51\u7684\u5b89\u5168\u6027\uff0c\u5b9a\u671f\u66f4\u65b0\u7f51\u5173IDS\u7684\u89c4\u5219\u96c6\u548c\u8f6f\u4ef6\u662f\u5f88\u91cd\u8981\u7684\u3002\u6211\u4eec\u53ef\u4ee5\u4f7f\u7528\u547d\u4ee4\u884c\u5de5\u5177\u6216\u914d\u7f6e\u6587\u4ef6\u6765\u66f4\u65b0Suricata\u7684\u89c4\u5219\u96c6\u3002\u6b64\u5916\uff0c\u6211\u4eec\u8fd8\u5e94\u8be5\u7ecf\u5e38\u66f4\u65b0\u670d\u52a1\u5668\u4e0a\u7684\u64cd\u4f5c\u7cfb\u7edf\u548c\u76f8\u5173\u8f6f\u4ef6\uff0c\u4ee5\u4fee\u590d\u6f5c\u5728\u7684\u6f0f\u6d1e\u3002<\/li>\n<\/ol>\n<p>\u7ed3\u8bba:<br \/>\u901a\u8fc7\u4f7f\u7528\u7f51\u5173IDS\u5e76\u914d\u7f6e\u9632\u706b\u5899\u89c4\u5219\uff0c\u6211\u4eec\u53ef\u4ee5\u4fdd\u62a4CentOS\u670d\u52a1\u5668\u5185\u90e8\u7f51\u7edc\u7684\u5b89\u5168\u3002\u4ec5\u4ec5\u5b89\u88c5\u4e00\u4e2aIDS\u7cfb\u7edf\u662f\u4e0d\u591f\u7684\uff0c\u6211\u4eec\u8fd8\u9700\u8981\u5b9a\u671f\u66f4\u65b0\u89c4\u5219\u96c6\u3001\u76d1\u63a7\u65e5\u5fd7\u5e76\u53ca\u65f6\u62a5\u8b66\u3002\u53ea\u6709\u901a\u8fc7\u7efc\u5408\u7684\u5b89\u5168\u63aa\u65bd\uff0c\u624d\u80fd\u6709\u6548\u5730\u4fdd\u62a4\u670d\u52a1\u5668\u5185\u7f51\u514d\u53d7\u7f51\u7edc\u653b\u51fb\u7684\u5a01\u80c1\u3002<\/p>\n<p>\u53c2\u8003\u8d44\u6599\uff1a<\/p>\n<ul>\n<li>Suricata\u5b98\u65b9\u6587\u6863: https:\/\/suricata.readthedocs.io\/<\/li>\n<li>iptables\u6587\u6863: https:\/\/netfilter.org\/documentation\/<\/li>\n<\/ul>\n<p>\uff08\u6ce8\uff1a\u672c\u6587\u4e2d\u7684\u793a\u4f8b\u4ee3\u7801\u4ec5\u4f9b\u53c2\u8003\uff0c\u5177\u4f53\u73af\u5883\u4e0b\u8bf7\u6839\u636e\u5b9e\u9645\u60c5\u51b5\u8fdb\u884c\u8c03\u6574\u548c\u6d4b\u8bd5\u3002\uff09<\/p>\n<p>\u4ee5\u4e0a\u5c31\u662f\u5982\u4f55\u4f7f\u7528\u7f51\u5173IDS\u4fdd\u62a4CentOS\u670d\u52a1\u5668\u5185\u90e8\u7f51\u7edc\u7684\u5b89\u5168\u7684\u8be6\u7ec6\u5185\u5bb9\uff0c\u66f4\u591a\u8bf7\u5173\u6ce8FDCServers\u5176\u5b83\u76f8\u5173\u6587\u7ae0\uff01<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5982\u4f55\u4f7f\u7528\u7f51\u5173ids\u4fdd\u62a4centos\u670d\u52a1\u5668\u5185\u90e8\u7f51\u7edc\u7684\u5b89\u5168 \u6458\u8981\uff1a\u968f\u7740\u7f51\u7edc\u653b\u51fb\u7684\u4e0d\u65ad\u589e\u591a\uff0c\u4fdd\u62a4\u670d\u52a1\u5668\u5185\u7f51\u5b89\u5168\u53d8\u5f97\u5c24\u4e3a\u91cd\u8981\u3002\u672c\u6587\u5c06\u4ecb\u7ecd\u5982\u4f55\u4f7f\u7528\u7f51\u5173IDS\uff08Intrusion Detection System\uff09\u6765\u4fdd\u62a4CentOS\u670d\u52a1\u5668\u5185\u90e8\u7f51\u7edc\u7684\u5b89\u5168\u3002\u6211\u4eec\u5c06\u901a\u8fc7\u914d\u7f6e\u7f51\u5173IDS\u6765\u76d1\u63a7\u7f51\u7edc\u6d41\u91cf\uff0c\u5e76\u4f7f\u7528\u57fa\u4e8e\u89c4\u5219\u7684\u9632\u706b\u5899\u6765\u963b\u6b62\u6076\u610f\u6d41\u91cf\u8fdb\u5165\u5185\u90e8\u7f51\u7edc\u3002\u6587\u7ae0\u4e2d\u8fd8\u5c06\u5305\u542b\u4e00\u4e9b\u793a\u4f8b\u4ee3\u7801\u6765\u5e2e\u52a9\u8bfb\u8005\u66f4\u597d\u5730\u7406\u89e3\u548c\u5b9e\u65bd\u8fd9\u4e9b\u5b89\u5168\u63aa\u65bd\u3002 \u7b80\u4ecb\u7f51\u5173IDS\u662f\u4e00\u79cd\u901a\u8fc7\u76d1\u63a7\u548c\u5206\u6790\u7f51\u7edc\u6d41\u91cf\u6765\u68c0\u6d4b\u548c\u963b\u6b62\u6076\u610f\u6d3b\u52a8\u7684\u7cfb\u7edf\u3002\u5b83\u901a\u8fc7\u76d1\u89c6\u7f51\u7edc\u884c\u4e3a\u548c\u6d41\u91cf\uff0c\u8bc6\u522b\u548c\u62a5\u544a\u53ef\u80fd\u7684\u653b\u51fb\u884c\u4e3a\u3002\u901a\u8fc7\u5c06\u7f51\u5173IDS\u7f6e\u4e8e\u5185\u90e8\u7f51\u7edc\u548c\u5916\u90e8\u7f51\u7edc\u4e4b\u95f4\u7684\u7f51\u5173\u4f4d\u7f6e\uff0c\u6211\u4eec\u53ef\u4ee5\u6709\u6548\u5730\u4fdd\u62a4\u670d\u52a1\u5668\u5185\u7f51\u7684\u5b89\u5168\u3002 \u5b89\u88c5\u548c\u914d\u7f6e\u7f51\u5173IDS\u9996\u5148\uff0c\u6211\u4eec\u9700\u8981\u5b89\u88c5\u548c\u914d\u7f6e\u4e00\u4e2a\u7f51\u5173IDS\u8f6f\u4ef6\uff0c\u4f8b\u5982Suricata\u3002Suricata\u662f\u4e00\u4e2a\u529f\u80fd\u5f3a\u5927\u7684\u5f00\u6e90IDS\/IPS\u7cfb\u7edf\uff0c\u5b83\u53ef\u4ee5\u5728CentOS\u670d\u52a1\u5668\u4e0a\u8fd0\u884c\u3002 (1) \u5b89\u88c5Suricata\uff1a$ sudo yum install epel-release$ sudo yum install suricata (2) \u914d\u7f6eSuricata\uff1a$ sudo vi \/etc\/suricata\/suricata.yaml\u5728\u914d\u7f6e\u6587\u4ef6\u4e2d\uff0c\u6211\u4eec\u53ef\u4ee5\u901a\u8fc7\u5b9a\u4e49\u89c4\u5219\u96c6\u3001\u542f\u7528\u65e5\u5fd7\u8bb0\u5f55\u3001\u914d\u7f6e\u544a\u8b66\u7b49\u6765\u5b9a\u5236Suricata\u7684\u884c\u4e3a\u3002 \u914d\u7f6e\u9632\u706b\u5899\u89c4\u5219\u5728\u7f51\u5173\u4e0a\u914d\u7f6e\u9632\u706b\u5899\u89c4\u5219\u6765\u963b\u6b62\u6076\u610f\u6d41\u91cf\u8fdb\u5165\u670d\u52a1\u5668\u5185\u7f51\u662f\u975e\u5e38\u91cd\u8981\u7684\u3002\u6211\u4eec\u53ef\u4ee5\u4f7f\u7528iptables\u6216nftables\u6765\u5b9e\u73b0\u8fd9\u4e00\u70b9\u3002\u4ee5\u4e0b\u662f\u4e00\u4e2a\u4f7f\u7528iptables\u7684\u793a\u4f8b\uff1a (1) \u521b\u5efa\u4e00\u4e2a\u65b0\u7684iptables\u94fe\uff1a$ sudo iptables -N IDS (2) \u5c06\u7f51\u5173IDS\u7684\u65e5\u5fd7\u6d41\u91cf\u5b9a\u5411\u5230\u8fd9\u4e2a\u94fe\uff1a$ sudo iptables -A INPUT -j IDS (3) \u5728IDS\u94fe\u4e0a\u914d\u7f6e\u89c4\u5219\uff1a$ sudo iptables -A IDS -m conntrack &#8211;ctstate ESTABLISHED,RELATED -j ACCEPT$ sudo iptables -A IDS -m conntrack &#8211;ctstate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-61568","post","type-post","status-publish","format-standard","hentry","category-os"],"_links":{"self":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts\/61568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/comments?post=61568"}],"version-history":[{"count":0,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/posts\/61568\/revisions"}],"wp:attachment":[{"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/media?parent=61568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/categories?post=61568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fwq.ai\/blog\/wp-json\/wp\/v2\/tags?post=61568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}