HP-UX Host Intrusion Detection System Version 4.3 administrator guide

Table Of Contents
Data Source
Process (DSP)
A component of the HP-UX HIDS agent that reads the data sources and presents the
information for alert calculation.
Detection
template
Basic building block or pattern to be used to combat security attacks on systems.
Duplicate alert An alert whose attacker (uid), target, type of attack (action), and program name
attributes are same as one of the alerts already reported by HIDS, within the specified
Suppression Count and Suppression Interval values.
Duplicate Alert
Suppression
(DAS)
A feature that suppresses duplicate alerts from being generated and reported to the
HIDS administrator console. This feature is applicable only for kernel related templates
except for the race condition and buffer overflow templates.
HTML HyperText Markup Language (HTML) is a markup language for creating web pages.
Intrusion An intrusion is also referred to as an attack. A violation of system security policy by
an unauthorized outsider. An intrusion can include intruding in to an unauthorized
network area, accessing certain systems within the network, accessing certain files,
or running certain programs.
Intrusion
Detection Data
Source (IDDS)
The HP-UX kernel-based audit system used by HPUX HIDS to monitor the host
system for potential intrusion activities.
Intrusion
Detection System
(IDS)
An automated system that detects a security violation on a system or a network.
Kernel The core of the operating system. It is the compiled code responsible for managing
the system’s resources, such as memory, file system, and input and output.
Managed host A host that is actively managed by the HIDS Administrative GUI or CLUI.
Open View
Operations
(OVO)
A distributed client and server software solution designed to detect, solve, and prevent
problems occurring in networks, systems, and applications in any enterprise. OVO
is a scalable and flexible solution that can be configured to meet the requirements of
any IT organization and its users. In addition, you can expand the applications of
OVO by integrating management applications from HP OpenView partners or other
vendors.
Response Script Once HP-UX HIDS detects an intrusive activity, it sends an alert to the System
Manager. In addition, it executes a set of programs located on the system that was
attacked. This script is passed with the details of the alert, and can take whatever
actions the system administrator requires.
Secure Sockets
Layer (SSL)
A protocol for sending data across a network that prevents an eavesdropper from
observing or modifying any data transmitted. It is used for all HP-UX HIDS
communication between agent systems and the administration system.
Summary alert An alert containing a summary of duplicate, suppressed alerts of a previously reported
alert.
Suppression
count
The maximum number of duplicate alerts suppressed for a given alert.
Suppression
interval
The maximum elapsed time during which duplicate alerts of a particular alert are
suppressed.
Surveillance
Group
A group of detection templates. For example, all detection templates related to
checking for file system intrusions that can be grouped into a “File System”
surveillance group.
Surveillance
Schedule
A set of configurable surveillance groups to be deployed on one or more systems on
a scheduled basis. A particular surveillance group is assigned to run on a given system
at one or more particular times of the day on one or more given days of the week.
System Manager
GUI
The graphical user interface (GUI) through which you control the operations of HP-UX
HIDS and where notification of alerts are displayed.
Template
Properties
External values provided as parameters to templates to change a template behavior
at run time.
Glossary of HP-UX HIDS Terms 27