HP Host Intrusion Detection System (HIDS) manual Product Overview, HP-UX Hids Deployments

Page 5

2.0OVERVIEW

2.1Product Overview

HP-UX HIDS is an HP-UX host intrusion detection product that can enhance local host-level security within your network. It does this by automatically monitoring each configured host system within the network for possible signs of unwanted and potentially damaging intrusions. If successful, such intrusions could lead to the loss of availability of key systems or could compromise system integrity.

As HIDS continuously examines ongoing activity on a system, it seeks out patterns that might suggest security breaches or misuses. These might include, for example, an attacker attempting to break into or disrupt your system, subversive insider activities, or someone trying to spread a virus. Once you have activated HIDS for a given host system and it detects an intrusion attempt, the host sends an alert to the administrative interface where you can immediately investigate the situation, and when necessary, take action against the intrusion. HIDS also supports customized local responses to, for example, notify the administrator through e-mail or pager.

2.2 HP-UX HIDS Deployments

HIDS can be deployed on any HP-UX 11iv1 or 11iv2 server that contains applications and data that need to be monitored for protection and/or availability, such as web servers, transaction processors, application servers, and database systems. The performance of HIDS depends on the system load, the rate at which certain system calls are invoked by other applications, and the HIDS configuration.

2.3 Sizing and Tuning Overview

The following guidelines should be used when selecting a system to run HIDS. They are discussed in more detail in Section 3.0 Sizing and Tuning Recommendations.

Templates, the component of HIDS that detects intrusions, are designed to take advantage of multiple CPUs, if available.

The amount of memory and disk space needed depends on the system load profile and the HIDS configuration.

Sustained high loads can consume large amounts of memory. When heavily loaded, CPU is the eventual performance bottleneck.

HIDS performance tuning is limited to:

Surveillance schedule configuration

Process priority setting

System performance tuning is limited to:

Blocking vs Non-blocking IDDS mode

HP Company Internal

Page 5 of 20

Image 5
Contents HP Company Internal Legal Notices Contents Purpose of Document Product IdentificationIntended Audience GlossaryHP-UX Hids Deployments Sizing and Tuning OverviewProduct Overview Sizing Guidelines Sizing and Tuning RecommendationsDisk Capacity Tuning ConsiderationsKernel Tuning System performance over security Executablestack Reference Documents/ Web sites Appendix a CPU Consumption Way PA CPU Consumption on PA ProcessorsEvent/sec Way IA CPU Consumption on Itanium ProcessorsWay IA Memory Consumption on PA Processors Appendix B Resident Memory ConsumptionResident Memory KB Memory Consumption on Itanium Processors Way IA
Related manuals
Manual 55 pages 31.55 Kb Manual 270 pages 6.58 Kb