Content deleted Content added
Remove GreatHorn as it is not a HIDS product |
move ELs to EL section, alpha, dashes |
||
Line 10:
=== Monitoring dynamic behavior ===
Many computer users have encountered tools that monitor dynamic system behaviour in the form of [[anti-virus software|anti-virus]] (AV) packages. While AV programs often also monitor system state, they do spend a lot of their time looking at who is doing what inside a computer
Intrusion prevention systems are a type of HIDS software that protects against [[buffer overflow]] attacks on system memory and can enforce [[security policy]].<ref name=cox_gerg2004/>
Line 24:
==== Technique ====
In general a HIDS uses a [[database]] (object-database) of system objects it should monitor
During the communication establishment phase and while transferring the data requested by the client, the host's server and the client exchanges a passphrase to verify their identity. The server uses the same passphrase all the time for this purpose. Based upon that an object is created.
Line 33:
==== Operation ====
At installation time
Computer systems generally have many dynamic (frequently changing) objects which intruders want to modify
Once a system administrator has constructed a suitable object-database
=== Protecting the HIDS ===
A HIDS will usually go to great lengths to prevent the object-database, checksum-database and its reports from any form of tampering. After all, if intruders succeed in modifying any of the objects the HIDS monitors, nothing can stop such intruders from modifying the HIDS itself
Apart from crypto-techniques, HIDS might allow administrators to store the databases on a [[CD-ROM]] or on other read-only memory devices (another factor militating for infrequent updates...) or storing them in some off-system memory. Similarly, a HIDS will often send its logs off-system immediately
One could argue that the [[trusted platform module]] comprises a type of HIDS. Although its scope differs in many ways from that of a HIDS, fundamentally it provides a means to identify whether anything/anyone has tampered with a portion of a computer. Architecturally this provides the ultimate (at least {{As of|2005|alt=at this point in time}}) host-based intrusion detection, as depends on hardware external to the [[central processing unit|CPU]] itself, thus making it that much harder for an intruder to corrupt its object and checksum databases.
Line 50:
==See also==
* [[IBM Internet Security Systems]] – commercial HIDS / NIDS
* [[Intrusion detection system]] (IDS)
* [[Network intrusion detection system]] (NIDS)
* [[
* [[Tripwire (software)]]
* [http://www.trendmicro.com/us/enterprise/cloud-solutions/deep-security/ Deep Security] - a commercial multi-platform HIDS▼
* [[Trusted Computing Group]]
* [[Trusted platform module]]
* [[
* [https://www.threatstack.com ThreatStack]▼
==References==
Line 76 ⟶ 74:
==External links==
▲* [http://www.trendmicro.com/us/enterprise/cloud-solutions/deep-security/ Deep Security]
▲* [https://www.threatstack.com ThreatStack]
{{Use dmy dates|date=July 2011}}
|