Templates and Alerts

Changes to Log File Template

Table A-12

 

Append-Only File Being Modified Alert Properties (Continued)

 

 

 

 

 

 

 

 

Response

 

Alert

Alert Field

 

 

 

Program

 

Alert Value/Format

Description

 

 

Field

Type

 

Argument

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

argv[8]

Details

String

“User with uid <uid> <performed

Detailed alert

 

 

 

 

 

action on the file> <full

description

 

 

 

 

 

pathname>(type=<type>,inode=<inod

 

 

 

 

 

 

e>, device<device>) when executing

 

 

 

 

 

 

<program>(type=<type>,inode=<inod

 

 

 

 

 

 

e>,device=<device>), invoked as

 

 

 

 

 

 

follows: <argv[0]> <argv[1]>..., as

 

 

 

 

 

 

process with pid <pid> and ppid

 

 

 

 

 

 

<ppid> and running with effective

 

 

 

 

 

 

uid=<euid> and with effective

 

 

 

 

 

 

gid=<egid>.

 

 

 

 

 

 

where <performed action on the file>

 

 

 

 

 

 

is set to one of the following:

 

 

 

 

 

 

"opened for modification/truncation"

 

 

 

 

 

 

"deleted the file"

 

 

 

 

 

 

"deleted the directory"

 

 

 

 

 

 

"performed system call <value> on

 

 

 

 

 

 

the file"

 

 

 

 

 

 

"renamed the file"

 

 

 

 

 

 

"truncated the file"

 

 

 

 

 

 

"created the file (and overwrote any

 

 

 

 

 

 

existing file) named"

 

 

 

 

 

 

 

 

argv[9]

Local Time

Integer

<secs>

Local time in

 

 

 

 

 

 

number of seconds

 

 

 

 

 

 

since epoch when

 

 

 

 

 

 

file is modified

 

 

 

 

 

 

 

 

 

 

Refer to Table B-1 in Appendix B for the definition of argv[10] through argv[32] that can

NOTE

 

 

 

 

be used to access specific alert information (i.e., pid, ppid) without having to parse the

 

 

 

string alert fields above.

 

 

 

 

 

• The template cannot distinguish between whether a file is created or truncated

Limitations

 

 

 

 

when creat(2) is invoked.

 

154

Appendix A

Page 166
Image 166
HP Host Intrusion Detection System (HIDS) manual Limitations, 154