Summary


In this chapter, you learned that HIPS products have management infrastructure and agent components. HIPS agents act like security guards and decide whether to allow or deny a person access to a building resource. The guards use an access control process to make the decision and identify the resource the person attempts to access. They continue and gather data about the operation, determine the state of the system, consult the security policy, and finally take action.

HIPS products tackle each phase of the access control process differently. This chapter examined the different approaches in detail. Real HIPS products were used as examples in some cases.

In the first phase of the access control process, the agent identifies the resource being accessed. Commonly identified resources include the following:

  • Network

  • Memory

  • Application execution

  • Files

  • System configuration

The next phase is the data gathering phase. HIPS products gather data using one or more of the following methods:

  • Kernel modification

  • System call interception

  • Virtual OSs

  • Network traffic analysis

HIPS products also determine the state of the system. States in common use include the following:

  • Location state

  • User state

  • System state

The data that was gathered about the resource access attempt and system state is compared to one or more of the following policy types:

  • Anomaly-based

  • Atomic rule-based

  • Pattern-based

  • Behavioral

  • Access control matrix

The access control process concludes when the HIPS takes action based on the results of the access attempt to policy comparison.

This chapter also addressed the management center and interface components of the management infrastructure. The management center portion was divided into database, event and alert handling, and policy management components. The properties and approaches to each component were discussed. Lastly, the various types of management interface client and management interface security considerations were addressed.




Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals
ISBN: 1587052393
EAN: 2147483647
Year: N/A
Pages: 115

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net