Jump to content United States-English
HP.com Home Products and Services Support and Drivers Solutions How to Buy
» Contact HP
More options
HP.com home
HP-UX System Administrator's Guide: Security Management: HP-UX 11i Version 3 > Appendix B Other Security Products

HP-UX HIDS

» 

Technical documentation

Complete book in PDF
» Feedback
Content starts here

 » Table of Contents

 » Glossary

 » Index

HP-UX Host Intrusion Detection System (HIDS) enables security administrators to proactively monitor, detect, and respond to attacks within a network, as follows:

  • Protects against both existing attack scenarios and against some as of yet unknown scenarios. It seeks out patterns that might suggest security breaches or misuses by examining information about system activity from a variety of data sources. Such illicit activities might include: a hacker attempting to break into or disrupt your system, subversive "insider" activities, or someone trying to spread a virus

  • Detects product enhances local host-level security within your network. It automatically monitors each configured host system within the network for possible signs of unwanted and potentially damaging intrusions. If unchecked it can lead to the loss of availability of key systems or can compromise system integrity. HP-UX HIDS generate alerts for many types of exploits.

  • Provides continuous protection against both existing attack scenarios and unknown scenarios unlike other intrusion detection systems. It detects intrusions by using detection templates. Detection templates are the building blocks used to identify the basic types of unauthorized system activity or security attacks frequently found on enterprise networks.

  • Provides notification in the event of suspicious activity that might precede an attack. By contrast, other intrusion detection systems rely entirely on an operator-instigated analysis of the system log files. Typically the operator analyses the system log files at the end of the day. This delay in the analysis of the attack provides considerable time to damage the system.

Printable version
Privacy statement Using this site means you accept its terms Feedback to webmaster
© 2008 Hewlett-Packard Development Company, L.P.