HP-UX Host Intrusion Detection System Release 4.0 Release Notes for HP-UX 11i v1 | HP-UX 11i v2

Announcement
Benefits
Chapter 110
Benefits
The HP-UX HIDS intrusion detection product offers the following
benefits:
Automatically monitors each configured host system within the
network for possible signs of unwanted and potentially damaging
intrusions.
Provides continuous surveillance against inappropriate system
usage that include attempting to break into or disrupt the system,
modifying system files and directories, or attempting to spread a
virus.
Continuously examines ongoing activity on a system and seeks out
patterns that might suggest security breaches or misuse due to the
exploitation of certain vulnerabilities:
Vulnerability: Unauthorized File Modification
Monitors: Critical system and application programs and
configuration files
System and application log files
File additions and deletion
Critical files made world writablePrivileged
“setuid” programs created
Files modified by non-owners
Vulnerability: Poorly written privileged programs
Monitors: Buffer overflows and Race conditions
Vulnerability: Weak password or unauthorized access
Monitors: Logins/Logouts
Vulnerability: Password guessing
Monitors: Failed logins and failed su attempts