Top 5 open-source HIDS systems
The threat landscape has become increasingly diverse and the systems used to attack are more sophisticated than ever before. In 2018, enterprises and organizations of all sizes and across all industries faced serious data breaches (information leaks were experienced by Aadhar —1.1B users; myFitnessPal —150M; Quora—100M; Facebook—29M and many more). One of the biggest victims was Marriot. A single unauthorized access led to the theft of 500M personal identifiable pieces of information. According to the “2018 Data Breach Investigation Report” more than 73% of breaches were committed by outsiders.
There’s no question about it, intrusion detection systems are important to ensure the security of modern organizations’ assets and all network traffic. These safeguards are used to defend restricted access to an organization’s network. When it comes to intrusion detection systems, there are two different types; host-based (HIDS) and network-based systems (NIDS). Network-based IDS analyze network traffic for any intrusion and produce alerts while HIDS trace the hosts’ behaviors for any suspicious activity by examining events on your network.
This article will cover five open-source host-based intrusion detection systems to help you protect your organization.
About HIDS
Before diving deeper into the HIDS tools, let’s explore what host-based intrusion detection systems are. As discussed previously, an intrusion detection system is a hardware or software application that detects and alerts administrators when a malicious activity has been detected. HIDS mainly focus on monitoring and analyzing log files in order to detect anomalies and unauthorized alterations based on predefined policies and a set of rules. In other words, the HIDS is as effective as the pre-established rules you’ve added. With a large number of stored logs, extracting meaningful information is critical to detect anomalies. The extracted information should be accurate. Therefore, ensuring the security of those logs is essential to defend against log manipulation.
1. OSSEC
OSSEC is short for Open Source Security Event Correlator. This established and reputable solution is a free and open-source host-based intrusion detection system developed and maintained by the OSSEC foundation thanks to a huge list of contributors. It was later owned by Trend Micro. This is a growing project with around 5000 monthly downloads and is characterized by its scalability and multi-platform aspect because it runs on Windows, different Linux distributions, and MacOS. OSSEC is often compared to Wazuh; we will cover some of the breakdown between OSSEC vs. Wazuh is a common comparison made by HIDS or SIEM users. We will go over Wazuh later in this list.
As a HIDS, this tool gives you the ability to perform log analysis, file integrity checking, policy monitoring, rootkit detection, and active response using both signature and anomaly detection methods. It provides valuable insight into systems operations in order to detect anomalies. OSSEC employs a server-agent model – meaning a dedicated server provides aggregation and analysis for every host. To install and configure OSSEC, the steps are pretty easy, but OSSEC does have some disadvantages. For example, if you want to upgrade to a newer version, you will lose the rules you defined due to an overwriting operation unless you export the rules and import them after the migration. However, if you aggregate multiple devices and different services (web servers, databases, firewalls, etc.) OSSEC is a good choice as a powerful log analysis engine.
Later releases have added an authentication log file for debian-based systems and a non-standard Sophos UTM timestamp for analysisd (3.6.0), multi-line log collection for indented logs (3.5.0), and other upgrades to multi-line logging.
2. Tripwire
As the name indicates this is a free and open-source host-based detection system developed by Tripwire. The company offers a commercial solution too, but we will focus on the open-source HIDS. The open-source Tripwire package runs exclusively on almost all Linux distributions. Known for its great capabilities to ensure data integrity, it helps system administrators to detect alterations to system files and notifies them if there are corrupted or tampered files.
To install it on your Linux host, you can simply use the apt-get or yum utilities. During the installation, you will be asked to add a required passphrase. It’s best to select a complex one. Once it’s installed, you’ll need to initiate the database and you can easily start your checks. If you need a well-integrated Linux intrusion detection system, open-source Tripwire may be your best choice, but it comes with a few limitations. For example, it does not notify you in real time, so you’ll need to go through the logs by yourself. You’ll also need to install it after installing your OS so that it does not detect malicious activities prior to its installation.
The following screenshot illustrates the rules and the security level of each one in addition to other indications.
3. Wazuh
Wazuh is another open-source monitoring solution for integrity monitoring, incident response, and compliance. The latest version, as of the writing of this article, is 3.8.2. As mentioned before, you might see comparisons of Wazuh vs. OSSEC online, but not just because of the similar purpose but also a common origin. Wazuh started as a fork of OSSEC and as the official documentation indicates, it was built with more reliability and scalability. Wazuh uses anomaly and signature detection methods to detect rootkits in addition to performing log analysis, integrity checking, Windows registry monitoring, and active response. It differs from OSSEC in its ability to be integrated with ELK, its improved ruleset, and the ability to use restful API. Wazah can also be leveraged to monitor files within Docker containers by focusing on the persistent volumes and bind mounts.
This HIDS is composed of 3 major components: agents, a server, and an eLK stack. Its agents run on Windows, Linux, Solaris, BSD, and Mac operating systems. To learn how to install the project, it is highly recommended that you follow the official installation guide. The steps are easy to follow and well explained. Wazuh comes with a few drawbacks. Server installation and API can be painful to get right.
The following screenshot represents the overview dashboard of Wazuh:
As of release 3.11.2, the Wazuh UI was upgraded for Kibana (at the time, 7.5.2) with upgrades to its XML validator and an increased file size limit.
4. Samhain
Samhain is an open-source HIDS with central management that helps you check file integrity, monitor log files, and detect hidden processes. This multi-platform solution runs on POSIX systems (Unix, Linux, Cygwin/Windows).
Samhain is really simple to install, you just need to download the tar.gz file from the official web page and install it on your system. Before that, you need to ensure that MySQL and Apache are running on your server. Samhain projects come with extensive and detailed documentation. This HIDS also provides centralized and encrypted monitoring capabilities over TCP/IP communications. It differs from the other previously discussed open-source HIDS by its stealth capabilities—masking itself from intruders—thanks to the paranoid code put together by its developers. While the Samhain community is good, it is more difficult to install than the other HIDS. Windows’ clients require Cygwin to be installed plus its reports are difficult to understand at first.
Samhain logs are by default located at /var/log, with a default for XML writing (configuring it with the ./configure –enable–xml-log command). Samhain includes log file rotation and lock capabilities. It facilitates logging for SQL databases, consoles, emails, syslog, Prelude IDS and more.
5. Security Onion
Security Onion is a free and open-source intrusion detection system built on Linux designed and maintained by Doug Burks. This project is composed of three components: full packet capture function, intrusion detection systems that correlate host-based events with network-based events in addition to many other toolsets including Snort, Bro, Sguil, Suricata, and many other utilities.
Security Onion is more than an intrusion detection system. At the end of the day, if you want to set up a Network Security Monitoring (NSM) platform easily and within minutes, this tool is the answer thanks to its friendly wizard.
Before installing it, you need to know that Security Onion only supports 64-bit hardware. You can find in-depth technical requirements in the official documentation as well. The installation steps of Security Onion are quite easy. After reading the documentation, including the requirements and the release notes, you need to download an ISO image.
Security Onion is the best choice if you are pressed for time, but it has some drawbacks. First, It doesn’t support Wi-Fi for managing the network. Plus, you’ll have to learn how to handle the different tools to learn make distribution efficient. In addition to that, it doesn’t automatically backup configurations other than rules. To do that you’ll need to use third-party utilities.
This screenshot illustrates real-time events detection using Security Onion (Sguil):
Summary
Deploying a host-based intrusion detection system is vital for modern organizations. There are many HIDS on the market with different capabilities. To help you narrow it down, we selected five open-source tools to give you deep visibility of what’s happening on your hosts. The selection was based on a number of criteria including the popularity of the tools, their features, and the hosted operating systems.
HIDS are just one of many important security tools that will help teams improve the security posture of their companies. And choosing the right assortment of tools can be tough. Consider questions like: does your team have the ability to bake security into DevOps practices? What are the nuances when thinking about security in the cloud? Security Analytics is becoming a major trend for companies increasingly overwhelmed with the sprawl of security tools and the amount of data they produce. Check out our Complete Cloud Operations Security Blueprint for more on SecOps tools and best practices.