HP-UX Host Intrusion Detection System Release 4.0 Release Notes for HP-UX 11i v1 | HP-UX 11i v2 | HP-UX 11i v3
Benefits
The HP-UX HIDS intrusion detection product offers the following benefits:
• Automatically monitors each configured host system within the network for
possible signs of unwanted and potentially damaging intrusions.
• Provides continuous surveillance against inappropriate system usage that include
attempting to break into or disrupt the system, modifying system files and
directories, or attempting to spread a virus.
• Continuously examines ongoing activity on a system and seeks out patterns that
might suggest security breaches or misuse due to the exploitation of certain
vulnerabilities:
Vulnerability: Unauthorized File Modification
Monitors: Critical system and application programs and configuration
files
System and application log files
File additions and deletion
Critical files made world writable
Privileged “setuid” programs created
Files modified by non-owners
Vulnerability: Poorly written privileged programs
Monitors: Buffer overflows and Race conditions
Vulnerability: Weak password or unauthorized access
Monitors: Logins/Logouts
Vulnerability: Password guessing
Monitors: Failed logins and failed su attempts
• Complements network-based security solutions and bolsters the overall security
of the computing infrastructure. HP-UX HIDS is designed to detect intrusions that
network-based security products cannot identify, thereby strengthening the
integrity of the host system as the last line of defense.
• Provides immediate notification when a suspicious activity is detected, and
supports real-time response.
Documentation
The HP-UX HIDS documentation includes manuals, manpages, information on the HP
OpenView SMART Plug-In, an IDS Mailing List, and the ITRC Security Forum.
Benefits 11