After intruding into the underlying operating system of a device, a hacker configures and modifies the system for long-term control and further penetration. HIPS monitors the underlying operating system of the device in real time and provides detection modules described in Table 1. Once a suspicious event is detected, HIPS immediately sends the corresponding log.
Name |
Description |
---|---|
File privilege escalation detection |
After adding the SUID/SGID permission bit for executable files, a user can run high-risk commands even if the user logs in to the system as a common user later. HIPS sends the corresponding log when it detects that the SUID/SGID permission bit is added for executable files. |
Abnormal shell detection |
After intruding into a device successfully, a hacker may modify an existing shell of the device to facilitate the establishment of a control channel for a reverse shell. HIPS sends the corresponding log when it detects that a shell is modified. |
Rootkit detection |
A rootkit is a tool used by hackers to hide their tracks and retain root access during attacks. HIPS sends the corresponding log when it detects any system file that has rootkit characteristics on the device. |
Key file tampering detection |
After a successful intrusion, a hacker may modify key files or leave malicious files. HIPS sends the corresponding log when it detects that a key file is tampered with or a suspicious file exists in a key path. |
Unauthorized root user detection |
Each user has a user identity (UID), and UID 0 is reserved for the root user, making a non-root account with UID 0 highly suspicious. HIPS sends the corresponding log when it detects a non-root account with UID 0. |
After the NMS manages the device through NETCONF, HIPS can provide more functions. Table 2 describes the functions and how they are implemented.
Function |
Description |
Implementation |
---|---|---|
Policy file customization |
The HIPS policy file contains the configuration and status of detection modules. The detection module configuration includes the monitoring list and whitelist information. The status of a detection module indicates whether the detection module is running after HIPS is enabled. A detection module cannot be configured or independently enabled or disabled on the device — these can only be carried out on the NMS. |
|
HIPS log display |
HIPS logs sent by the device are displayed on the NMS. |
|