Intrusion Detection: Concepts, Challenges, and Best Practices

Effective intrusion detection for large enterprises hinges on combining signature‑based pattern matching with baseline anomaly modeling, gathering comprehensive host and network logs, focusing on the GetShell foothold, managing alert fatigue, and integrating AI‑enhanced feature engineering while maintaining robust operational foundations and continuous expertise development.

Meituan Technology Team
Meituan Technology Team
Meituan Technology Team
Intrusion Detection: Concepts, Challenges, and Best Practices

Large internet companies constantly face the challenge of detecting intrusions. High‑value enterprises are attractive targets, and successful breaches can cause severe damage.

We define intrusion as any unauthorized control or use of resources (reading/writing data, executing commands, etc.). Typical scenarios include remote control of laptops, servers, or network devices, data exfiltration, mining, DDoS, and manipulation of critical infrastructure.

Enterprise intrusion detection usually focuses on unauthorized access to PCs, servers, and networks (both office and production). The most common foothold is a GetShell action, obtained via web uploads, RCE vulnerabilities, or planted backdoors.

While “insider” threats also involve unauthorized data handling, they are managed through internal risk controls (segregation of duties, dual‑approval, DLP) rather than intrusion‑detection mechanisms.

The core of intrusion detection is distinguishing malicious behavior from legitimate activity – essentially a binary classification problem (intrusion vs. non‑intrusion). Labeled intrusion samples are scarce, making supervised learning difficult; therefore, security engineers often rely on precise feature engineering or synthetic data generation.

Two main detection approaches are:

Pattern matching based on known malicious signatures (e.g., WebShell keywords).

Baseline modeling of normal business behavior and flagging anomalies.

Effective detection requires enumerating attack vectors and collecting the appropriate logs (HIDS, NIDS, WAF, RASP, application and system logs, etc.). Different services (SSH, RDP, MySQL, Redis, FTP, etc.) must be hardened or restricted to reduce the attack surface.

Web‑based intrusions remain the primary entry point; common tactics include uploading WebShells, exploiting file inclusion, and abusing code execution features. Monitoring WAF logs, access logs, and system calls is essential.

Zero‑day attacks share common post‑compromise behaviors (shell usage, lateral movement), so focusing on the GetShell stage can yield detection value even when the initial exploit is unknown.

Detection products fall into several categories:

Host agents (HIDS) – e.g., OSSEC, Qingting Cloud, Anquanke.

Network sensors (NIDS/NIPS) – e.g., Snort, commercial solutions.

Log aggregation and SIEM platforms – e.g., Splunk, LogRhythm.

Sandbox/APT analysis – e.g., FireEye, Palo Alto, Symantec.

Endpoint detection and response (EDR) – e.g., Bit9, SEP, Kaspersky.

Evaluation metrics include proactive detection rate, blue‑team detection rate, and coverage of known scenarios. Alert fatigue must be managed by de‑duplicating repeated alerts, providing clear risk descriptions, and ensuring actionable guidance.

Key success factors are data completeness, sensor reliability, accurate baseline data, and efficient ticketing/operation support. Without solid operational foundations, even the best models cannot reliably detect intrusions.

Advanced Persistent Threats (APTs) are hard to detect because they use stealthy, often zero‑day techniques. Current practice combines sandbox analysis, traffic anomaly detection, and UEBA to surface suspicious behavior.

AI has accelerated model development for tasks like WebShell detection, but the scarcity of high‑quality malicious samples limits performance. AI should complement, not replace, traditional feature engineering and expert knowledge.

Meituan Security’s team possesses extensive experience in penetration testing, web protection, binary and kernel security, distributed systems, and big‑data analytics. They are building a zero‑trust, multi‑cloud security architecture covering network, virtualization, OS, runtime, and application layers.

Recruitment: Meituan Security is hiring for web/binary offense‑defense, backend/system development, and machine‑learning/algorithm roles. Interested candidates should email [email protected].

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

AIincident responseSecurity Operationscybersecurityintrusion detection
Meituan Technology Team
Written by

Meituan Technology Team

Over 10,000 engineers powering China’s leading lifestyle services e‑commerce platform. Supporting hundreds of millions of consumers, millions of merchants across 2,000+ industries. This is the public channel for the tech teams behind Meituan, Dianping, Meituan Waimai, Meituan Select, and related services.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.