HIPS - host-based intrusion prevention

Traditional Anti-Virus software was pattern based: it looked for specific sequences of executable code to identify virus threats. The virus writers got smarter, and introduced viruses that scrambled their code as they propagated, defeating the AV efforts. See Virus Research and Defense Bok Review for a detailed look at this whole area.

HIPS instead tries to look at what the program does, either by intercepting system calls or watching packets or other system activity. These may be rule based or may assign scores for certain activity. The problem, of course, is that a program you need to run may generate activity that a HIPS program finds suspicious. This gotcha has so far kept HIPS at the high end of the food chain; home users and small businesss don't usually have the resources to deal with something this complex. A buffer overflow probably indicates malicious code, but it may also just be bad programming. A hardware inventory tool would probably make any HIPS call foul, and so on.

Anything HIPS does is really something that should be in the OS itself, and probably will be in future years. Today, kernels are too much obedient servants, blindly doing the bidding of any program that asks. We have only the very beginning of security in the kernel; most of what we do today is added on. This will change - it has to. Hardware will also play its part in the security picture, but less trusting kernels are necessary.



Got something to add? Send me email.





(OLDER) <- More Stuff -> (NEWER)    (NEWEST)   

Printer Friendly Version

-> -> HIPS - host-based intrusion prevention


2 comments



Increase ad revenue 50-250% with Ezoic


More Articles by

Find me on Google+

© Tony Lawrence







Wed Sep 21 04:06:11 2005: 1102   drag


Do you figure that things like SElinux and LSM would prove more usefull for this stuff in the future? By using mandatory access control-like permissions it makes it possible to setup permissions for programs and users based what they need to do in order to operate correctly, but block them and/or throw up red flags when they try to do something unexpected. I figure a person could use this technology to setup a effect HIPS system.

I know right now that it's a pain to setup and pre-setup versions like found in Fedora and Redhat aren't that usefull, but it's reliable and it works and it has already prevented software programming errors into turning into real vunerabilities. But I figure it will mature and advances will make it simplier for the average administrator to configure and deal with.



Wed Sep 21 08:15:34 2005: 1104   TonyLawrence

gravatar
Yes, that's part of it, but we need more. I think kernels are going to become much bigger and have more and more intelligence.

------------------------
Kerio Connect Mailserver

Kerio Samepage

Kerio Control Firewall

Have you tried Searching this site?

Unix/Linux/Mac OS X support by phone, email or on-site: Support Rates

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us





Standards are always out of date. That’s what makes them standards. (Alan Bennett)

We are stuck with technology when what we really want is just stuff that works. (Douglas Adams)







This post tagged: