HP-UX Host Intrusion Detection System Version 4.1 Administrator's Guide
being monitored. HP provides a customized program for OpenView Operations (OVO)
integration; you can also create your own.
HP-UX HIDS Limitations
HP-UX HIDS cannot solve all security-related problems. Following are the limitations
of HP-UX HIDS:
• HP-UX HIDS is not a replacement for comprehensive security policies and
procedures. You must define and implement security policies and procedures,
and configure HP-UX HIDS to enforce them. A lack of comprehensive policies,
procedures, and configuration can result in attacks going undetected. HP-UX HIDS
can also report false alerts, while your system remains vulnerable.
• HP-UX HIDS does not prevent the onset of attacks. If your system is vulnerable
to attacks, those vulnerabilities remain even after HP-UX HIDS is installed.
• HP-UX HIDS does not find static security flaws on a system, nor does it prevent
the onset of attacks. It only reports the possibility of an attack or an intrusion. For
example, if a password file contained an illegitimate account before HP-UX HIDS
was installed, that illegitimate account remains vulnerable even after HP-UX HIDS
is installed and operational. Furthermore, HP-UX HIDS cannot authenticate users
of a valid account. For example, if users share passwords, HP-UX HIDS cannot
ascertain the identity of the user gaining access to the system.
HP-UX HIDS Components
HP-UX HIDS includes the following components:
• System Manager The System Manager is a GUI that enables you to configure,
control, and monitor the HP-UX HIDS system. Any intrusions detected are reported
as alerts.
• Host-based agent The host-based agent gathers system data, monitors system
activity, and issues intrusion alerts.
• Detection templates Detection templates contain the most commonly encountered
system attack patterns. Therefore, once these patterns of activity are recognized
as matching with one of the HP-UX HIDS detection templates, HP-UX HIDS can
detect the intrusion.
• Data-gathering components HP-UX HIDS comprises modules that gather and
format information from data sources at various points within the system. Kernel
audit data and system log data are the data sources. HP-UX HIDS uses these
components to monitor all resources within the network.
• Correlation engine HP-UX HIDS uses a correlation process that takes data from
system data sources and determines whether an alert must be issued.
HP-UX HIDS Components 27