Host Intrusion Detection System Release 3.1 Release Notes
Announcement
Benefits
12
Benefits
The HP-UX HIDS intrusion detection product offers the following benefits:
• Automatically monitors each configured host system within the network for possible signs
of unwanted and potentially damaging intrusions.
• Provides continuous surveillance against the inappropriate system usage that is
characteristic of hacker break-in attempts, subversive inside activities, and viruses.
• Complements network-based security solutions and bolsters the overall security of the
computing infrastructure. HP-UX HIDS is designed to detect intrusions that
network-based offerings cannot identify, thereby strengthening the integrity of the host
system as the last line of defense.
• Continuously examines ongoing activity on a system and seeks out patterns that might
suggest security breaches or misuses. The types of threats that HP-UX HIDS monitors
include the following:
System critical Unauthorized access
Privilege violations
Trojan horse
“Root” exploits
HP-UX Operating System Race condition
Buffer overflow
Password guessing
User security Failed logins
Failed SU attempts
User A modifying User B’s file
Files Modification of critical system files and directories
Creation of world writable files
Creation of setuid files
Critical file creation and deletion
• Provides immediate notification in the event of suspicious activity that might precede an
attack.