Host-based Intrusion Detection Systems (HIDS)
Pieter de Boer Martin Pels 09/02/2005
Host-based Intrusion Detection Systems (HIDS) Pieter de Boer - - PowerPoint PPT Presentation
Host-based Intrusion Detection Systems (HIDS) Pieter de Boer Martin Pels 09/02/2005 Contents HIDS-types Example break-in Protection using HIDS Evasion possibilities Evasion prevention Conclusion 09/02/2005 Host-based
Pieter de Boer Martin Pels 09/02/2005
09/02/2005 Host-based Intrusion Detection Systems 2/8
➔ AIDE, Mtree
➔ Swatch, Sec
➔ Scanlogd, PortSentry
➔ IDSpbr, LIDS
09/02/2005 Host-based Intrusion Detection Systems 3/8
09/02/2005 Host-based Intrusion Detection Systems 4/8
➔ Detection of PHP-file upload and netcat execution
➔ Detection files (PHP-file & netcat binary) and
➔ Detection of unauthorized daemons
➔ Detection of root-exploit execution
09/02/2005 Host-based Intrusion Detection Systems 5/8
➔ Encoding of requests
➔ Deletion of files after use, modify file monitor
➔ Set up netcat connection to the outside
➔ Use of undetectable exploits
09/02/2005 Host-based Intrusion Detection Systems 6/8
➔ Anomaly detection
➔ Realtime monitoring,
➔ Detection of connections to the outside
➔ Anomaly detection
09/02/2005 Host-based Intrusion Detection Systems 7/8
09/02/2005 Host-based Intrusion Detection Systems 8/8