[Security and safety] Difficult host invasion detection!

Author:Information security research Time:2022.08.06

My journal has been launched for a long time, the [Morning Safety] column,

In the form of graphic comics, I will tell you some interesting things and news of the "Internet security circle",

Welcome everyone to submit a lot

In this issue, we have united Aoko Cloud's safe Qing Xiaobao,

It is so difficult to talk about the invasion test of the host side. Essence Essence

Refusing the server "Robbing"

I was asked such a question a few days ago

The host is so important

Why did you start to pay attention to the invasion test of the host's side in recent years?

In fact, the reason is simple: deep barriers, large investment, high risk

Most manufacturers are unwilling to go to this hard bone

1. What is HIDS?

Host invading detection system (HIDS)

It is based on the host's invasion detection system

Yes, this time it is not based on the invasion of the network side.

It is based on the host side

It runs an agent by running on the detected host

The agent plays the role of the detection engine

For the test host for web back door, rebound shell,

Local rights, system back doors, mining Trojan horses

And monitoring and detection

When discovering suspicious acts and safety violations

The system will report to the administrator in order to take measures

2. Why do you engage in HIDS?

To put it plainly, it is forced by the evolution of attack technology

First of all, the Internet invaders are full of recruitment, and the recruitment is fatal

Secondly, the enemy is sometimes inside, which is invincible

Finally, the invasion that the border defense equipment can block is less and less invasion

Fate

And want to ensure the security of the network

Relying on network invasion detection system (NIDS)

It's not enough to fire the firewall (FW)

Instead, we must start with the core host for safety protection

This requires tailor -made for the host

HIDS's protection of all time

Where is the technical barrier of HIDS?

This advanced, professional, and bombing HIDS

Is it the "dream love" of all the net security people?

Although there are many HIDS manufacturers now

But most of the products exist like this or that

It is difficult to meet the true demands of users

Either too many reports, similar to virtual

Nine do not issue alert

This kind of HIDS is almost equal to white

Either the alarm is overwhelming, it is difficult to distinguish the true and false

Safety personnel have to receive hundreds of alarms a day,

But most of the alarms are meaningless

Because no one has time to control it at all

What is even more terrible is

These misunderstandings will even flood the real valuable alarm

Either based on the characteristic library, the unknown threat is not detected

Some HIDS products are "d” "

You can only be based on the feature library that has been set

To detect the threat

In the face of the type of threats that are not entered in the characteristic library

It became "blind"

4. What kind of HIDS products are good?

1. The detection capacity of multi

Monitor each node of the attack path

And provide cross -platform multi -system support capabilities

Guaranteed to be able to discover the failure host in real time

Alert the invasion behavior

2. Detect and alarm "successful invasion", seize the key points

Only alert to the successful invasion behavior

Reduce the number of alarms and make the alarm more valuable

3. Based on behavioral analysis, effectively discover the attack of unknown means

Combined with expert experience, threat intelligence, big data, machine learning, etc.

Multiple analysis methods

Through real -time monitoring and in -depth understanding of the user host environment

Effective discovery of various unknown attacks including "0Day"

4. Combined with asset information to provide the most accurate front -line information for response

Not only can I find invasion

It can also provide detailed invasion analysis and response methods

Let users solve the problem accurately and effectively

Incident in real -time invasion on the host

Send to the SoC/SIEM platform for linkage

Provide services such as processes, IP ban, file isolation/deletion and other services

If HIDS products have the above stunts

Implement the host invasion detection

Low missed reports, low error posters, active detection of unknown threats, real -time linkage security platforms

Okay, if you have any about

Demands and questions of intrusion detection or network security

You can scan the code to add Qing Xiaobao's security engineer, father WeChat

- END -

Relatives of the Watanabe: Until extinction, almost no one believes its existence

The ferry bird from Mauritius is the first animal in the world to be identified. T...

Summer travel popularity continues to climb Alipay membership hotel equity monthly receipt of more than 2 times

Summer traveling heat, driving the liquor travel industry data to continue to rise. Today, the Alipay members released the July Rights and Intersection Rankings. The liquor industry has the highest po