Host Intrusion Detection System Administrator's Guide Release 3.0

Overview
HP-UX HIDS Components
Chapter 1
10
HP-UX HIDS Components
HP-UX HIDS consists of the following components. See “Glossary of HP-UX HIDS
Terms” on page 13 for more definitions.
Management interface. The System Manager allows the administrator to
configure, control, and monitor the HP-UX HIDS system. Any intrusions detected
are reported here as alerts.
Host-based agent. The agent gathers system data, monitors system activity, and
issues intrusion alerts.
Detection templates. Most attacks exhibit a limited number of common patterns
and similar steps. Therefore, once these patterns of activity are recognized as
matching one of the HP-UX HIDS detection templates, HP-UX HIDS can detect the
intrusion.
Data-gathering components. HP-UX HIDS provides a way of observing what
people are doing on your systems and networks. This is accomplished through a set
of data gathering modules that gather and format information from data sources at
various points within the system.
Correlation engine. HP-UX HIDS uses a correlation process that takes data from
system data sources and determines whether an alert should be issued.
Secure network communications link. HP-UX HIDS uses an encrypted network
link as a means of stopping an attacker from observing the traffic between its
components and possibly sending false data to disrupt its operations.
Response capability. Alerts are sent to the System Manager. In addition, the
alerts can be processed by response programs that you create and/or install.
Graphic Representation
Figure 1-1 shows a graphic representation of these components.
The HP-UX HIDS System Manager performs Security Management and develops
Surveillance Schedules that are sent to the HP-UX HIDS Agent where they are run at
specified times, using Kernel Audit Data and System Log Data.
If an alert is generated, it is sent to the HP-UX HIDS System Manager, which posts it as
an Alert Notification.