防护CentOS Exploit攻击可从系统加固、访问控制、监控审计等方面入手,具体措施如下:
yum update
yum-cron
telnet
postfix
root
sudo
firewalld
iptables
Snort
ClamAV
/var/log/secure