HP-UX 11i Version 2 March 2006 Release Notes
Security
HP-UX Host Intrusion Detection System
Chapter 8
136
HP-UX Host Intrusion Detection System
HP-UX Host Intrusion Detection System (HIDS) Release 4.0 is a host-based security
product for HP computers running HP-UX 11i. HP-UX HIDS Release 4.0 enables
security administrators to proactively monitor, detect, and respond to attacks targeted at
specific hosts. There are many types of attacks that can bypass network-based detection
systems. HP-UX HIDS Release 4.0 complements existing network-based security
mechanisms and enhances enterprise security.
Summary of Change
HP-UX HIDS version 4.0 supports the following new features and enhancements:
• Reducing alert volume by aggregation - HIDS supports a new feature called alert
aggregation that can significantly reduce the alert volume for a monitored system.
When enabled, alerts that are generated by a process or a group of related processes
are aggregated until the processes terminate or a certain amount of time elapses.
• Reducing alert volume by monitoring only critical files - The template property
values of the file-related preconfigured groups and templates have been modified to
monitor only the core critical files to reduce the alert volume. For example, only
certain files in the /etc directory (such as /etc/passwd and /etc/shadow) are
monitored instead of the entire directory.
• Configuring critical users - In earlier releases, the system templates (login/logout
and su) hard-coded root and ids as being critical for determining alerts with high
severity. Since applications like HP-UX Role-Based Access Control
1
support the
assignment of root privileges to several users, HIDS must support configuration of
critical users. The system templates support new template properties to specify the
critical user names.
• Support to specify user names and user IDs - The template properties that specify
user IDs (for example, priv_uid_list) in previous releases now support the
specification of both user IDs and user names.
• Measuring the event rate - A new idscor option (-t) is supported to measure the
rate of events generated by a system and monitored by HIDS. If you know the event
rate, you can refer to the HIDS Tuning and Sizing primer (available at
http://docs.hp.com/en/internet.html#Host%20Intrusion%20Detection%20Sy
stem) to determine the impact of HIDS on memory and CPU consumption.
Impact
There are no impacts other than those listed previously.
Compatibility
HP-UX HIDS Release 4.0 is backward compatible with Release 3.1 and Release 3.0. It is
not backward compatible with Release 1.0, Release 2.0, Release 2.1, and Release 2.2.
1. HP-UX Role-Based Access Control is available on the Software Pack (SPK) media
for HP-UX 11i v2 December 2005.