HIDS - 9/10/2007 1 Host based Host based Intrusion...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 9/10/2007 1 Host based Host based Intrusion Detection System HIDS Wm. Arthur Conklin, PhD Assistant Professor Department of Information & Logistics Technology College of Technology Agenda o Definition o Placement o Information Discovered o Advantages o Limitations 2 2007 Wm. Arthur Conklin, PhD 9/10/2007 2 Definitions o Host Based Intrusion Detection System HIDS The use of a sensor located on a host to monitor and analyze information for signs of intrusion. and analyze information for signs of intrusion. o Host Based Tuned to OS OS traps Log files User behavior 3 User behavior o Hybrid Intrusion Detection System A system comprised of both network and host elements 2007 Wm. Arthur Conklin, PhD AV as an example o Anti-Virus Agents o Host based o Monitor system activity File reads File writes 4 2007 Wm. Arthur Conklin, PhD 9/10/2007 3 Security Policy o All a HIDS can do is enforce security policy at OS level Policy must be defined Conformance must be determinable...
View Full Document

Page1 / 8

HIDS - 9/10/2007 1 Host based Host based Intrusion...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online