一、入侵检测与应急处理
1. 异常行为检测
sudo lastb | awk '{print $3}' | sort | uniq -c | sort -nr
sudo grep "Failed password" /var/log/auth.log | awk '{print $11}' | sort | uniq -c
ps auxf | grep -E '(curl|wget|bash|sh|\.\/)'
netstat -antulp | grep ESTABLISHED
2. 快速隔离措施
sudo iptables -A INPUT -s 123.45.67.89 -j DROP
sudo ufw deny 22/tcp
3. 后门排查与清除
find / -name "*.php" -mtime -3
find / -type f -perm 0777
crontab -l
ls -al /etc/cron.*
二、系统安全加固
1. SSH安全配置
sudo vim /etc/ssh/sshd_config
Port 5022
PermitRootLogin no
MaxAuthTries 3
PasswordAuthentication no
2. 防火墙强化配置
sudo ufw default deny incoming
sudo ufw allow 5022/tcp
sudo ufw allow 80/tcp
sudo ufw allow 443/tcp
sudo ufw enable
3. 自动化入侵防御
sudo apt install fail2ban -y
sudo cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
sudo vim /etc/fail2ban/jail.d/sshd.local[sshd]
enabled = true
port = 5022
filter = sshd
logpath = /var/log/auth.log
maxretry = 3
bantime = 1d