OSSEC

OSSEC
OSSEC
Developer(s) Daniel B. Cid
Stable release 2.6 / Jul 19, 2011
Operating system Cross-platform
Type Security / HIDS
License GNU GPL v3
Website www.ossec.net

OSSEC is a free, open source host-based intrusion detection system (IDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting and active response. It provides intrusion detection for most operating systems, including Linux, OpenBSD, FreeBSD, Mac OS X, Solaris and Windows. It has a centralized, cross-platform architecture allowing multiple systems to be easily monitored and managed. It was written by Daniel B. Cid and made public in 2004.

Features were added to OSSEC to meet certain requirements for Payment Card Industry Data Security Standard (PCI DSS) compliance.[1] Details can be found documented in a PDF document provided by OSSEC.[1]

In June 2008 the OSSEC project and all the copyright owned by the project leader, Daniel B. Cid, were acquired by Third Brigade, Inc. They promised to continue to contribute to the open source community and extend commercial support and training to the OSSEC open source community.

In May 2009 Trend Micro acquired Third Brigade and the OSSEC project, with promises to keep it open source and free.

Contents

Software Components

OSSEC consists of a main application, a Windows agent, and a web interface software component.

  • Main Application: The main application, OSSEC, is required for distributed network or stand-alone installations. It is supported by Linux, Solaris, BSD, and Mac environments.
  • Windows Agent: The Windows Agent is provided for Microsoft Windows environments. An installation of the main application configured for server mode is required to support the Windows Agent.
  • Web Interface: A separate web interface application provides a graphical user interface. Like the main application, it is supported by Linux, Solaris, BSD, and Mac environments.

Capabilities

OSSEC has a very strong log analysis engine, being able to correlate and analyze logs from multiple devices and formats. The following are currently supported:

  • NIDS:
    • Cisco IOS IDS/IPS module
    • Snort IDS (snort full, snort fast and snort syslog)
  • Security tools:
  • Windows event logs (logins, logouts, audit information, etc.)
  • Windows Routing and Remote Access logs
  • Generic unix authentication (adduser, logins, etc.)

References

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • OSSEC — Тип Защита информации / HIDS Разработчик Даниэль Б. Сид Операционная система Кроссплатформенное программное обеспечение Последняя версия 2.6 (19 июля 2011 года) Лицензия GNU GPL v3 …   Википедия

  • ossec — ou osset (o sèk ou o sè) s. m. Terme de marine. Endroit bas d un bâtiment, où se rend l eau et où est placé le pied des pompes. HISTORIQUE    XVIe s. •   Les trous [du navire] qui prennent l eau au fond de l ossec, PASQUIER Lett. t. II, p. 398.… …   Dictionnaire de la Langue Française d'Émile Littré

  • osset — ossec ou osset (o sèk ou o sè) s. m. Terme de marine. Endroit bas d un bâtiment, où se rend l eau et où est placé le pied des pompes. HISTORIQUE    XVIe s. •   Les trous [du navire] qui prennent l eau au fond de l ossec, PASQUIER Lett. t. II, p.… …   Dictionnaire de la Langue Française d'Émile Littré

  • Daniel B. Cid — is the lead developer of the open source OSSEC HIDS and a principal researcher at Trend Micro, Inc. His interests range from intrusion detection, log analysis (log based intrusion detection) and secure development. He is an active member of the… …   Wikipedia

  • Host-based intrusion detection system — A host based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the internals of a computing system rather than on its external interfaces (as a network based intrusion detection system (NIDS) would do) …   Wikipedia

  • Comparison of firewalls — The following tables compare different aspects of a number of firewalls, starting from simple home firewalls up to the most sophisticated Enterprise firewalls. Contents 1 Firewall software 2 Firewall rule set basic filtering features comparison 3 …   Wikipedia

  • Rootkit — Pronunciation of Rootkit in US English Un rootkit (le nom « outil de dissimulation d activité » est également utilisé[1]), parfois simplement « kit », est un ensemble de techniques mises en œuvre par un ou plusieurs logiciels …   Wikipédia en Français

  • Система обнаружения вторжений — (СОВ)  программное или аппаратное средство, предназначенное для выявления фактов неавторизованного доступа в компьютерную систему или сеть либо несанкционированного управления ими в основном через Интернет. Соответствующий английский… …   Википедия

  • Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”