# # HIPS - host-based intrusion prevention
APLawrence.com -  Resources for Unix and Linux Systems, Bloggers and the self-employed

HIPS - host-based intrusion prevention

I've removed advertising from most of this site and will eventually clean up the few pages where it remains.

While not terribly expensive to maintain, this does cost me something. If I don't get enough donations to cover that expense, I will be shutting the site down in early 2020.

If you found something useful today, please consider a small donation.



Some material is very old and may be incorrect today

© September 2005 Tony Lawrence
September 2005

Traditional Anti-Virus software was pattern based: it looked for specific sequences of executable code to identify virus threats. The virus writers got smarter, and introduced viruses that scrambled their code as they propagated, defeating the AV efforts. See Virus Research and Defense Bok Review for a detailed look at this whole area.

HIPS instead tries to look at what the program does, either by intercepting system calls or watching packets or other system activity. These may be rule based or may assign scores for certain activity. The problem, of course, is that a program you need to run may generate activity that a HIPS program finds suspicious. This gotcha has so far kept HIPS at the high end of the food chain; home users and small businesss don't usually have the resources to deal with something this complex. A buffer overflow probably indicates malicious code, but it may also just be bad programming. A hardware inventory tool would probably make any HIPS call foul, and so on.

Anything HIPS does is really something that should be in the OS itself, and probably will be in future years. Today, kernels are too much obedient servants, blindly doing the bidding of any program that asks. We have only the very beginning of security in the kernel; most of what we do today is added on. This will change - it has to. Hardware will also play its part in the security picture, but less trusting kernels are necessary.


If you found something useful today, please consider a small donation.



Got something to add? Send me email.





(OLDER)    <- More Stuff -> (NEWER)    (NEWEST)   

Printer Friendly Version

->
-> HIPS - host-based intrusion prevention

2 comments


Inexpensive and informative Apple related e-books:

Take Control of High Sierra

Take Control of Preview

Take Control of Pages

iOS 10: A Take Control Crash Course

Take Control of iCloud





More Articles by © Tony Lawrence







Wed Sep 21 04:06:11 2005: 1102   drag


Do you figure that things like SElinux and LSM would prove more usefull for this stuff in the future? By using mandatory access control-like permissions it makes it possible to setup permissions for programs and users based what they need to do in order to operate correctly, but block them and/or throw up red flags when they try to do something unexpected. I figure a person could use this technology to setup a effect HIPS system.

I know right now that it's a pain to setup and pre-setup versions like found in Fedora and Redhat aren't that usefull, but it's reliable and it works and it has already prevented software programming errors into turning into real vunerabilities. But I figure it will mature and advances will make it simplier for the average administrator to configure and deal with.



Wed Sep 21 08:15:34 2005: 1104   TonyLawrence

gravatar
Yes, that's part of it, but we need more. I think kernels are going to become much bigger and have more and more intelligence.

------------------------


Printer Friendly Version

Have you tried Searching this site?

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us


Printer Friendly Version





If you lie to the computer, it will get you. (Perry Farrar)




Linux posts

Troubleshooting posts


This post tagged:

Security



Unix/Linux Consultants

Skills Tests

Unix/Linux Book Reviews

My Unix/Linux Troubleshooting Book

This site runs on Linode