Content deleted Content added
cleaning up lead prose |
→Overview: for clarity |
||
Line 12:
Many computer users have encountered tools that monitor dynamic system behaviour in the form of [[anti-virus software|anti-virus]] (AV) packages. While AV programs often also monitor system state, they do spend a lot of their time looking at who is doing what inside a computer – and whether a given program should or should not have access to particular system resources. The lines become blurred here, as many of the tools overlap in functionality.
Some [[
=== Monitoring state ===
Line 25:
==== Technique ====
In general a HIDS uses a [[database]] (object-database) of system objects it should monitor – usually (but not necessarily) file system objects. A HIDS could also check that appropriate regions of memory have not been modified – for example, the system call table for [[Linux]], and various [[virtual method table|vtable]] structures in [[Microsoft Windows]].
For each object in question a HIDS will usually remember its attributes (permissions, size, modifications dates) and create a [[checksum]] of some kind (an [[MD5]], [[SHA1]] hash or similar) for the contents, if any. This information gets stored in a secure database for later comparison (checksum database).
|