Tag

Intrusion Detection

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Dec 26, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article details a real‑world Linux server breach, describing the symptoms, investigative commands, log analysis, malicious script removal, file attribute unlocking, and practical remediation steps, while highlighting key lessons and preventive measures for future security.

Incident ResponseIntrusion DetectionLinux
0 likes · 16 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Efficient Ops
Efficient Ops
May 8, 2024 · Information Security

How to Detect and Recover from Linux Server Intrusions: 11 Essential Checks

This guide walks Linux operations engineers through eleven practical checks—including log inspection, user file verification, login event analysis, network traffic monitoring, and file recovery via lsof—to identify and remediate compromised machines effectively.

Intrusion DetectionLinuxLog Analysis
0 likes · 7 min read
How to Detect and Recover from Linux Server Intrusions: 11 Essential Checks
AntTech
AntTech
Nov 28, 2022 · Information Security

Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response

This article details the evolution, architecture, and key technologies of Ant Group's anti‑intrusion platform, explaining how it handles trillion‑level data streams for intrusion detection, performs multi‑dimensional risk assessment and attribution, and enables rapid, automated security incident response across massive enterprise environments.

Information SecurityIntrusion DetectionRisk Assessment
0 likes · 15 min read
Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response
Efficient Ops
Efficient Ops
Nov 20, 2022 · Information Security

How to Detect and Recover from Linux Server Intrusions: Essential Checks

This guide outlines eleven practical steps for Linux system administrators to identify signs of compromise—such as missing logs, altered password files, unusual login activity, abnormal traffic, and deleted files—and provides command examples for detection and recovery.

Intrusion DetectionLinuxLog Analysis
0 likes · 7 min read
How to Detect and Recover from Linux Server Intrusions: Essential Checks
Architecture Digest
Architecture Digest
Oct 8, 2022 · Information Security

Server Intrusion Investigation and Remediation Steps on a Linux Host

This article documents a real‑world Linux server compromise, detailing the observed symptoms, forensic commands, malicious scripts, file‑locking tricks, and a step‑by‑step remediation process including SSH hardening, cron cleanup, chattr usage, and preventive security recommendations.

CronIntrusion DetectionLinux
0 likes · 15 min read
Server Intrusion Investigation and Remediation Steps on a Linux Host
Efficient Ops
Efficient Ops
Sep 13, 2022 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article details a real‑world Linux server compromise, describing the symptoms, possible causes, investigative commands, hidden malicious scripts, file attribute locks, and practical remediation steps to restore the system and improve future security.

CronIncident ResponseIntrusion Detection
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Architects' Tech Alliance
Architects' Tech Alliance
Jun 16, 2022 · Information Security

Host Security Capability Construction Guide: Key Capabilities, Industry Priorities, and Implementation Process

The Host Security Capability Construction Guide analyzes evolving threats, categorizes security capabilities into basic, enhanced, and advanced levels, details industry-specific priority requirements, and outlines a comprehensive construction and evaluation process to help enterprises select appropriate solutions and build an effective host security framework.

Intrusion Detectionasset inventorycompliance
0 likes · 12 min read
Host Security Capability Construction Guide: Key Capabilities, Industry Priorities, and Implementation Process
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
May 31, 2022 · Information Security

Fidas: FPGA‑Based Comprehensive Offloading for Cloud Intrusion Detection (ISCA 2022 Full‑Score Paper)

The ISCA 2022 full‑score paper “Fidas: Fortifying the Cloud via Comprehensive FPGA‑based Offloading for Intrusion Detection” presents a novel FPGA‑accelerated IDS architecture that jointly offloads regex matching and traffic classification, achieving high flexibility, rapid rule updates, balanced load, and line‑rate performance in cloud data centers.

Cloud SecurityFPGAISCA
0 likes · 7 min read
Fidas: FPGA‑Based Comprehensive Offloading for Cloud Intrusion Detection (ISCA 2022 Full‑Score Paper)
Efficient Ops
Efficient Ops
Apr 5, 2021 · Information Security

Essential Linux Account Security & Intrusion Investigation Checklist

This guide explains how to secure Linux accounts, examine critical system files, use command‑line tools to monitor logins, detect suspicious activity, analyze logs, and investigate potential intrusions, providing practical steps for administrators to harden and audit their servers.

Intrusion DetectionLinuxLog Analysis
0 likes · 13 min read
Essential Linux Account Security & Intrusion Investigation Checklist
HomeTech
HomeTech
Jul 31, 2019 · Information Security

Enterprise Intrusion Detection System Architecture and Feature Overview

This document outlines the background, challenges, and a comprehensive enterprise intrusion detection solution that combines host‑based and network‑based monitoring, automated CVE and GitHub leak collection, a modular agent‑middle‑display architecture, and future plans for multi‑dimensional threat modeling to enhance preventive security capabilities.

CVE collectionIntrusion DetectionSOC
0 likes · 10 min read
Enterprise Intrusion Detection System Architecture and Feature Overview
Efficient Ops
Efficient Ops
May 11, 2017 · Information Security

Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies

This article shares practical insights from a security director at YY Live, detailing the complex Linux security landscape, common vulnerabilities, real‑world attack techniques such as Redis abuse and privilege escalation, and a multi‑layered defense approach that balances rapid business iteration with robust protection.

DDoS mitigationIntrusion DetectionLinux security
0 likes · 21 min read
Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies