Session C10 Paper 224 Disclaimer—This paper partially fulfills a writing requirement for first year (freshman) engineering students at the University of Pittsburgh Swanson School of Engineering. This paper is a student, not a professional, paper. This paper is based on publicly available information and may not provide complete analyses of all relevant data. If this paper is used for any purpose other than these authors’ partial fulfillment of a writing requirement for first year (freshman) engineering students at the University of Pittsburgh Swanson School of Engineering, the user does so at his or her own risk. HOST INTRUSION PREVENTION SYSTEMS: A NEW PARADIGM FOR CYBER SECURITY Prateek Bhatt, [email protected], Sanchez, 17:00, Shubham Bhatt, [email protected], Sanchez, 17:00 Abstract—Cyber security or IT security, also known as computer security, is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide. This cyber security can be attained by the means of complex Intrusion Prevention Systems (IPS), which are essentially the complete process of identifying and responding to malicious activities targeted at computing and network resources. In this paper, we’ll be discussing Host Intrusion Prevention Systems (HIPS), and compare their infrastructure and working to other technologies which provide cyber security. Comparing Host Intrusion Prevention System (HIPS) to other security technologies like Intrusion Detection System (IDS), Network intrusion protection system (NIPS), and antivirus/antispyware, we will strive to differentiate between them by discussing the infrastructure and the reasoning they follow. Moral, and ethical implication correlating with moral and economic sustainability, achieved by HIPS, will be an integral part of the paper. Also, concluding that HIPS is by far the most plausible solution, we will also give some insights about the need for cybersecurity and the further development of existing systems in the future which goes hand in hand with moral and economical sustainability. occurring on the internet take place in cyberspace. Over the past several years, the cyberspace has been under attack. Our privacy, with our increased dependence on information laden society, is at stake and new threats such as denial of service attacks(DDoS) continue to emerge which give a basis for defining ethics in the cyber world. Moreover, the paradigm shift to an information age, where economies are based on information, has simultaneously generated new ethical and juridical problems, mainly related to issues such as the right of access to information, the right of privacy which is threatened by the emphasis on the free flow of information, and the protection of the economic interest of the owners of intellectual property [2]. Cybersecurity is the combination of IDS, which provides visibility, and IPS, which provides control, and they were further developed and designed to overcome the shortcomings. The new systems are HIPS, which provide security to the host computer, and NIPS, which provide security to the network used by the computer. Essentially, an infringement of cyber security creates social and economic challenges, which are a derivative of hacking and its resulting consequences, and are a rising concern. Key Words— Behavioral analysis of HIPS, cyber security, Host Intrusion Prevention Systems, HIPS Using Signature File Method, IBM - Proventia desktop endpoint security and its application, McAfee Host Intrusion Prevention for Desktop, Economic and Moral Sustainability, NAE Grand Challenges for Engineering, Network Intrusion Protection Systems. Cyber security is becoming a necessity in all environments including home and enterprise. For instance, according to U.S. News, hackers cost $445 billion annually to consumers and firms, which exponentially increasing, indirectly results to a loss of 200,000 jobs in the United States alone [3]. This example, thus, supports our call for the development and enhancement of cyber security. Moreover, every cyber attack has a significant impact on banking institutions, digital property, and economy. In fact, one need to consider many facets such as social impacts, which result in loss of trust, confidence, and a sense of freedom, other than just monetary ones. Thus, this description and introduction of cyber security are followed by an extensive clarification of existing cyber security technologies which not only helps to mitigate the effects of cybercrime but also provide valuable insight into its working. CYBERSECURITY: A RISING NECESSITY According to National Military Strategy for Cyberspace Operations, cyberspace is “a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify and exchange information via networked information systems and physical infrastructures” and can conventionally describe as anything associated with the internet and the diverse internet culture [1]. Thus, all events or activities University of Pittsburgh Swanson School of Engineering 1 Submission Date: 03.03.2017 Social and Economic Challenges Shubham Bhatt Prateek Bhatt received and delivered data packets on the network [7]. It learns how the applications work and notify the user as soon as there is any unfamiliar data transfer. Also, since it is anomaly based and not signature based, it is more likely to stop the zero day attacks or unknown and new patterned attacks. Therefore, HIPS can cover most of the attacks vectors. HIPS AND ITS FRAMEWORK A Host Intrusion Prevention System, which keeps intruders out of the host’s network layer to all the way up to the application layer, is a technology, which combining all the other systems like firewall, Intrusion Detection System (IDS), and anti-viruses, evaluates traffic before data enters a computer. This coalescing significantly reduces the total cost of ownership as instead of paying for three to four types of security technology licenses every term, an organization only needs to pay for one. HIPS and firewall are very closely related. A firewall examines the traffic to and from a system based on a definite set of rules, HIPS do a very similar thing but can make changes in your computer which firewall cannot. HIPS can protect against known and unknown dangerous threats. In the case of a malicious attack attempt by any hacker or malware, HIPS take appropriate actions like blocking the actions and alerting the user of the attack. HIPS can guard against many threats and changes which malware might want to make. Some of them are preventing hackers and malwares to take control of the programs in the computer like email client or internet browser to download some more malicious programs, stopping malwares from making any change in important registry keys which starts programs at certain events, restricting from ending other programs already installed on the computer like an antivirus, not allowing installation of other devices and drivers which can get started before other programs and change behavior of other preinstalled programs and stopping malware from processing memory access, so that it can insert malicious code into a trusted program [4]. HIPS provide users with multiple layers of security such as protection against local and network based attacks like IPS and protection against application based attacks like antivirus. According to Corman from IBM Security, “HIPS is like an airport security checkpoint. A variety of technologies look for multiple types of threats, including checking bags and people for weapons and chemical residues, and utilizing facial recognition software to identify wanted individuals” [5]. The following example will help us to understand the functioning of HIPS better. Suppose an attacker wants to attack an organization and corrupt the data files of the company. He will carry out a buffer overflow so that his malicious code can run in the memory space of the kernel and change the behavior of the computer accordingly resulting in replacement of data with corrupt data files and sometimes even crash the whole computer down. To prevent this type of activity, the HIPS solution will review the system call and compare it to either a list of signatures or a list of known good behaviors. If the HIPS solution identifies the call as malicious, it does not allow access. Vendors can use one or both approaches in their products [6]. Delving deeper into the subject at hand, HIPS technology uses behavioral analysis to prevent worms, viruses, Trojans, and spywares [7]. Inserting itself into the operating system kernel, HIPS monitors the Signature and Behavioral Analysis Per TechGenix, which is an online magazine about latest technology news and articles, “A signature based security filter operates somewhat like a law enforcement officer who seeks to identify criminals based on their modus operandi, or mode of operation. Specific actions and/or code sequences are compared against a database of known signatures, or predefined strings in code that are indicative of malware.” And on the other hand, the behavioral analysis is defined by TechGenix as “Heuristic algorithms that are often used to identity anomalies, by analyzing past network traffic, email, etc. and comparing it to current patterns or by analyzing the structure of the code itself. Heuristic engines today are typically rule-based, and heuristic engines can “learn” from previous experiences and build new rules accordingly” [8]. An antivirus has two main techniques to scan for virus: Signature and Behavior based. Malwares and viruses have signatures like humans have. Some of them have static signatures while other can change their signatures and try to get away from being detected by an antivirus. For static signatures, an antivirus has a predefined set of known signatures and while scanning it compares the predefined signatures and try to match with the signatures of viruses. If the signatures match, the file is classified as a threat and the user is notified to take further necessary actions. This is the signature based detection method. So, when you update your antivirus, the list of known predefined signatures is expanded with the inclusion of new known signatures to provide protection against new threats. But, hackers have become smarter with time and to evade the signature based security, they code viruses in such a way that they can change their signature and try to harm your system fooling the signature based antivirus. So, to overcome these problem experts came up with and started using behavioral analysis instead of signature analysis to identify threats. For example, imagine you are a burglar and are planning to break into a house. You try to gain as much information as much as possible about the house and its residents by using surveillance. Then you go to a weapons shop to pick up a weapon that can be used 'just in case'. Your behavior is suspicious as you have been planning it and is surveilling the house and its residents. You reach the store and there are the police with handcuffs. Your behavior was analyzed by the police and you were busted. Now, imagine the police as an antivirus and the burglar as the virus. The 'behavior' based antivirus works in the same way. It tries to identify the 'behavior' of a file. For example, consider a mp3 2 Shubham Bhatt Prateek Bhatt file trying to modify a system file or something like that which is unacceptable under normal circumstances. An antivirus will mark it as 'dangerous behavior' and hence the antivirus classifies it under 'threat' category [9]. The antivirus analyzes the behavior of the file and then classify gives it a red or green light. will have to be permitted under the UDP and TCP Rules in every group as shown in figure 1. APPLICATION OF HIPS As an epitome of providing unprecedented levels of protection from known and unknown zero-day threats, which are undisclosed attacks being used for the first time and have never been reported or caught, McAfee Host Intrusion Prevention for Desktop software, an integral product of Intel Security endpoint suites, combines signature and behavioral Intrusion Prevention System (IPS) protection [10]. Thus, it serves as an excellent system protection product for individuals and companies. Another product, IBM Proventia desktop endpoint security, is extensively used to demonstrate the implementation, configuration, and tuning of an enterprise HIPS. Designed for easy integration with an existing corporate infrastructure, including interoperability with Active Directory, most e-mail and Web clients, and popular antivirus and Virtual Private Network (VPN) software, IBM Proventia desktop endpoint security, also, automatically protects desktops and laptops against known and unknown threats, hackers and other improper activity on the desktop [11]. Moreover, the desktop systems, which are running the software, get multilayered architecture which blocks attacks through scanning system-critical files, folders, and registry keys which help protect against any unwarranted modification. Since we have discussed at length the working and architecture of HIPS, it is exigent to also learn about its installation as both go hand in hand. Hence, the next section of our paper focuses on the application and the entire setup of the HIPS in an enterprise. FIGURE 1 [5] A display of the Proventia site Protector For configuration, one needs to create groups, and if every computer has the same rules and policies, one would need only a single group. For companies that have mobile or remote workers, HIPS are very useful as HIPS can provide relatively the same level of protection as internal workstations; also, a VPN policy for your mobile laptops can be created to make sure they are updated and running [5]. This feature allows a specific department of a company to create a policy to only allow certain devices with certain ports over their VPN. Also, it’s also advisable to make a narrow, restrictive policy such that only the required members of the department are allowed to access in order to bolster the security provided. Next, in configuration, one would have to test the communication that occurs in a workstation, and then deploy the agents to the working stations. One shouldn’t deploy all the agents at once so that the if anything goes wrong, the workstations will still be protected [5]. If everything runs smoothly over a period of some days, one can deploy the rest of the agents to the workstations as the software is functional. Now, tuning HIPS takes time as one need to make sure that there are no false positives because of a poor setup of the system. Thus, while tuning one should baseline the alerts and begin checking high severity alerts and work our way down to low security alerts as shown in figure 2[5]. Doing so, helps us to eliminate any false alarm and find out the relevant ones. For example- If there are a lot of alarms and Windows attacks being triggered and there are only Linux or Unix operating systems being used, obviously, these are false-positives that do not need to be investigated and the signatures could be turned off; Another example is if SNMP or DHCP is being Setup of HIPS in an enterprise Generally, the settings of a HIPS govern the overall behavior of the component while the rules tend to provide direction in the way the system has to be protected. Implementing and configuring HIPS for an enterprise can be a rather tedious task, and it requires a thorough understanding of how the network is designed, how the application is used and how they function; most HIPS systems like Proventia Desktop which is managed by Site Protector, a centralized management console, is an Agent Manager which enables the Security Administrator to control what the agents will deny and permit on each workstation [5]. Another feature of this Proventia Desktop is to provide flexibility to set different filtering rules and filtering by IP type, IP address, UDP, TCP, ICMP, or create a custom filter [5]. To illustrate, if a virus agent of a tries to communicate over a port, say 2035, and connect to the server, the IP address of the server and the port 3 Shubham Bhatt Prateek Bhatt used in the network and its traffic is traversing the network all the time triggering a lot of alerts [5]. Also, one can always tune the alarms to our needs and base a Unix operating system as a low or medium alarm. To exemplify, Proventia Desktop provides a few default signatures which have the option to enable, disable, block or override the block for each signature they have which serves to reduce time investigating false-positives that are triggered repeatedly [5]. FIGURE 3 [20] The flow chart depicting Security and its Components This formula is the basis for the security of a network. The visibility of a network can be related to IDS. IDS provide us with active visibility of what is happening on our networks as it takes place as well as the ability to store this information for future use. Visibility through IDS makes it possible to create a security policy based on the real network data. The other component of security is control which is covered by IPS. IPS technology provides an active ability to control which makes it possible to enforce the security policies [12]. The combination of both these technologies is a perfect solution for most mid to large sized organizations. They both, along with new technologies, combine and contribute partially towards making of HIPS. Intrusion Detection System A protocol analyzer is a tool that a network engineer uses to look deep into the network and see what is happening. A good analogy is to compare IDS with a protocol analyzer [13]. IDS are placed on the side of a network to monitor traffic at many different points and provide visibility into the network. IDS look deep into the network from a security point of view. Most companies install IDS devices in the perimeter either between the firewall and the border router or outside of the border router. Also, many companies go an extra mile by installing IDS outside of the firewall and border router so that they see the full breadth of attempted attacks against them. Another approach is to deploy IDS both inside and outside of the perimeter devices so that it can be confirmed that weather or not a potential attack, which was seen outside of the perimeter, has successfully made it past to the inside of firewall and border routers. This approach requires more resources but it provides a clearer picture of the security. Some companies also deploy IDS devices on the out of band architecture, that is IDS sits on a shared media. While in this position, IDS devices capture as many data packets as it can and reports back to a management console. Another way is to deploy IDS on the parameter which is called in line deployment, which ensures all data coming into and leaving passes through this device prior to continuing into the corporate network. Other devices that sit in the same position are routers and firewalls. Having IDS at this position has a downside that if this device fails or malfunctions, all data will either continue to enter without any visibility or it will stop entering the network until IDS is fixed or changed. This exposes the company’s network to all the potential attackers as the traffic is allowed into the network without being monitored. For larger companies like google, which requires an extra need for full visibility into network traffic, a common method is to deploy IDS at all primary network points internally and externally. This method ensures visibility needed to track down internal threats as well as FIGURE 2 [5] Overall process of implementing, configuring, and tuning HIPS AN ANALYSIS AND COMPARISION OF OTHER PREVENTION SYSTEMS Threat management is the top priority these days. Be it e-commerce websites, online banking, and other high profile applications, every organization want to avail themselves of the best possible protection against unauthorized entry. So, the idea of security from the intrusion can be represented by a formula provided by Intrusion.com: Security = visibility + control as shown in figure 3[12]. 4 Shubham Bhatt Prateek Bhatt outside threats, considering that one of the greatest threats comes from insider threats like aggrieved employees or curious employees. The biggest drawback of IDS deployment is the performance factor. IDS is designed to grasp the greatest amount of data capture, but even with the higher performance components and updated software IDS tends to drop data packets due to high bandwidth of network devices. So, on a larger network, one need to increase the number of IDS devices to monitor all the segments of the network. This means that total cost of setting up and maintaining the IDS can be very high. Also, sometimes IDS generate false positives even when the network is not attacked. Another major problem with IDS deployments is to capture encrypted data packets. Currently, IDS cannot decrypt data packets and this stops security administrators from seeing what is coming into and going out of corporate network. Moreover, with the growth in encrypted data streams like Virtual Private Network (VPN) the need of another solution like IPS at the perimeter is becoming more and more important. Usually, firewalls and anti-virus try to block attacks and IDS helps in identifying them. IDS can evaluate traffic that passes through open ports but cannot stop it, so intrusion protection system comes to the play to actively block attacks [14]. attacks in various ways like by terminating the network connection, ending the user session where an attack originated, blocking access to the target from the user system, IP address, or by blocking every access to the targeted element. Also, it can respond in various ways to an attack. IPS can reconfigure firewall or router to block an attack. Some of the IPS can also apply patches by analyzing host’s vulnerabilities. For example, IPS can protect from malicious contents like an infected attachment from an email before letting it pass the network to the user [17]. IPS has two main types that are HIPS and Network Intrusion Prevention System (NIPS). NIPS solutions evaluate traffic before it's allowed into a network or subnet. HIPS solutions evaluate packets before they're allowed to enter a computer [6]. Unification of Intrusion Prevention System and Intrusion Detection System As IDS and IPS are placed at different spots on the network map, they together can and should be used concurrently. An IPS placed in line with the traffic flow helps to stop the zero day attacks, such as worms and viruses, and even the newest threats coming up every single day, with rigorous tuning. And at the same point IDS installed inside the firewall on the network map monitor data internally, guarding against an internal threat. Together both systems combine to lend greater visibility and control into security events. The idea of using both systems together is not usually implied by many corporations as it is not cost friendly. As IPS and IDS do not generate any income directly it becomes hard to justify this expense. However, without the visibility and control of the network, which is provided by IPS and IDS, there is a potential increase in costs associated with intrusion in the network and loss of important or confidential data. Over time many companies are coming up to use these systems together as they have begun to realize the advantages associated with these technologies are far above the cost to set them up. However, there are many advantages of using both these technologies together but they are not enough to protect a system from every possible attack as new superior attacks are coming up with every single passing day. Intrusion Prevention System Neil Desai from Symantec Corporation defines IPS with this statement, “You blended your Intrusion detection system with my firewall! No, you blended your firewall with my Intrusion detection system! Either way, when you combine the blocking capabilities of a firewall with the deep packet inspection of an Intrusion detection system, you get the new kid on the block: Intrusion prevention systems or IPS [15]”. Some groups also suggest that IPS is an evolution of IDS and eventually it will take over and IDS will disappear. IPS are devices or programs that detect intrusions into the network and take certain actions like generating alarms and/or blocking intrusions. Usually, IPS are in the form of hardware devices or software agents running on servers. A firewall is designed to block all network traffic except that which is explicitly allowed whereas an IPS is designed to permit everything except that which is explicitly disallowed [16]. It is easier to understand with an analogy of a security guard outside the lobby, who permits people to enter based on who they are. The guard permits the mail carrier and the package courier to bring letters and packages into the lobby, but the guard does not examine the contents of the packages or letters. In the mailroom, a mail clerk opens all the letters and packages and examines them. In this analogy, the guard is a firewall, who permits personnel to come and go, but does not examine the contents of the packages. The mailroom clerk is an IPS because the clerk is examining the contents of each letter and package [16]. IPS is placed in line with the traffic flows on a network map, that helps it to shut down attempted attacks. It stops Superior Technologies than IDS and IPS Today, cyber security is undergoing a renaissance in terms of providing better security with many technologies emerging or developing in the area. In comparison to other existent technologies like IDS, Network intrusion protection system (NIPS), and antivirus/antispyware, perhaps, HIPS is undoubtedly better and a boon to cyber security. HIPS, as compared to IDS, is a better option as even though IDS has the capability to tell what happened on the network, it cannot stop the attack from taking place; it waits for the attack to happen before sending out an alert about the intrusion [5]. So, HIPS are better than IDS for security. NIPS is better than IDS as it can stop attacks but is very limited in 5 Shubham Bhatt Prateek Bhatt its purpose as compared to HIPS. NIPS sometimes deny a legitimate traffic thinking that it is an intrusion and malicious. Moreover, both NIPS and IDS, unlike HIPS, cannot see the encrypted traffic on the network as they cannot see what is inside these files and cannot stop or alert for any encrypted files. Moreover, when compared to Antivirus and antispyware, HIPS are more efficient as even though antivirus scan for viruses, trojans, worms, and spyware, they still rely on signatures of attacks; they lack the ability to stop unknown attacks which can hurt the system while HIPS protects a system in all other ways that other types of protections cannot [6]. Thus, most companies and homes need to use HIPS. The main risk involved with using HIPS is wrong user decision due to improper or lack of proper knowledge. HIPS keep the track of changes that other software make on your system. For example, HIPS track all the changes made on the registry key, from where programs start at the boot up but there are many other programs that use this key as well, so when they try to make any change in the registry key HIPS prompts the user to allow the change or block it. Usually, most users hit allow, especially if they are trying to install a new program, because of improper or no knowledge of the change being made. Sometimes HIPS prompt what other users typically choose in that same case. So sometimes HIPS can identify threat only if the response from the user is well informed and correct for the safety point of view. If the user makes a mistake in selecting a response to the popup alert, the computer can still become infected and the purpose of HIPS will not be fulfilled [4]. between cybercrimes and ethics, which will not only make us more aware but helps us share the responsibility. Now that we understand the infrastructure, applications, and implications of cyber security and its techniques, the next section provides a brief outlook. Thus, by implementing, configuration, and tuning, one can set up the necessary HIPS in a business enterprise or even for our homes. The figure below helps to understand this entire process from beginning to the end. SUSTAINABILITY However, what if we do not take the indispensable act of formulating laws, and guidelines against cybercrimes and fail to spread awareness of the correlation between cybercrimes and ethics. The entire cyber infrastructure, encompassing all the information from health records, economic security, technologies enhancing warfare, patented medicine and vaccines to social identities, valuable experimental and classified data, would go down the road of vulnerability and collapse. This eventual, yet inevitable collapse would rather be a pitfall of the cavalier attitude towards augmenting cyber security and escaping the collective responsibility to fight cybercrimes than of an inefficient cyber security system. Moreover, the stakes are high, the least to say, considering that various war technologies and data could fall into the hands of terrorist organizations endangering not only a nation but the entire human race. Thus, the collapsing cyber infrastructure would jeopardize our lives, with the dilution of sustainable life. In fact, the essential meaning of technology, which is the science of applied knowledge aimed to make our lives easier, would ironically be given away when it tends to risk that very sustainable, comfortable life. Moreover, technology, per se, cyber security technologies and sustainability go hand in hand, an intersection we often fail to realize or tend to have various definitions of our own. A multifaceted definition depending on the interpretations of the audience, sustainability is lucidly narrowed by the UN's World Commission on Environment and Development (UNCE) as the "satisfying the needs of the present generation without compromising the ability of future generations to meet their own needs" [18]. This definition resonates with the idea of cyber security technologies like HIPS which help sustain cyber information by attenuation or preventing cyber attacks. Cyber information, in a nutshell, is an entire world of data essential to all individuals, enterprise and an economy as a whole and as dependence on it likely increases, it will continue becomes a critical part of our life and corresponding activities needed to sustain it. Imagine, without the safe cyber information sustainability, all our personal information could be leaked and our privacy would be compromised. Delving deeper, envision our mobiles, and laptops incapable of processing, transferring or modifying data and the futuristic self-driving cars, which hacked would be driver by the attacker accordingly, unable to make SOCIAL AND ETHICAL IMPLICATIONS Looking at the bigger picture, one needs to realize that these very technologies have impacted our lives on so many levels. The technologies or soft wares that make the decrypting of digital information difficult can be exploited by cyber criminals to create an alias or have profiles difficult to access. Often, this raises questions about ethics and morals. Ethics, essentially, is the questioning and examining of what is good or bad in terms of human actions. The ethical and private implications of cybercrime have effects both on an individual and social level. On an individual level, a breach of privacy leads to a loss of dignity, privacy, and autonomy; on a social and economic level, it leads to the growth of large information businesses like credit bureau and telecommunication companies that specialize in the processing and trade of person-related information. This brings about a redefinition of the role of society (big businesses) in the personal and private lives of the individual (the use of personal information as a commodity) [2]. Therefore, apart from distinguishing a breach of privacy, we need sets of guidelines and extensive ethical norms which will prevent manipulation of information by the means of technology. In essence, one should realize the great overlap 6 Shubham Bhatt Prateek Bhatt decisions like speed, direction, and control. Would you sit in such a car or use such a phone? Obviously, No. The cyber attacks are, thus, capable of rendering all the electronics running in our houses to be inept or useless. Thus, HIPS, as a technology, would rather play an integral part in consolidating social sustainability by protecting against unwarranted attacks. However, HIPS incorporated in IBM Proventia Desktop Endpoint Security is not only capable of persevering social sustainability but economic sustainability too. Inexpensive in comparison to the output delivered, and by far proficient in handling various cyber attacks, HIPS saves firms millions of dollars, which is a plus. This makes it economically viable, due to its fair price, and hence available to groups and individuals; together, considering the fact it saves millions of dollars, it in a true sense is an economically sustainable technology. Thus, HIPS fulfilling the definition of moral, and economical sustainability will improve the quality of our lives by providing and securing the future of the cyber information based era. However, even though HIPS can cover most of the attacks vectors, it is not all perfect as with the increase in technological advances, hackers tend to develop systems to infiltrate and break the system’s security layer. This will continue to sabotage our sustainability in every way possible, and it is essential for engineers to step up to their duty. http://ctnsp.dodlive.mil/files/2014/03/cyberpower-i-chap02.pdf . p. 24-42 [2] J. Britz. “TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges to the Information Profession”. Accessed 3.3.2017. http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html [3] T. Risen. “Study: Hackers Cost More Than $445 Billion Annually”. 9.06.2014. Accessed 3.03.2017. http://www.usnews.com/news/articles/2014/06/09/studyhackers-cost-more-than-445-billion-annually [4] P. Arntz. "What Is Host Intrusion Prevention System (HIPS) and How Does It Work?". Malwarebytes, 11 May 2013. Accessed. 3.03.2017. https://blog.malwarebytes.com/101/2013/05/whatiships/ [5] J. Chee. “Host Intrusion Prevention Systems and Beyond”. 6.02.2008. Accessed 3.03.2017. https://www.sans.org/readingroom/whitepapers/intrusion/host-intrusion-preventionsystems-32824 [6] S. Harris. "NIPS and HIPS." Security Content from Windows IT Pro. 20 Feb. 2006. Accessed. 3.03.2017. http://m.windowsitpro.com/security/nips-and-hips. [7] A.Tchakoucht, M.Ani, M. Jbilou, M. Salaun. Behavioral approach for intrusion detection. IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). 11.17.2015. Accessed 3.03.2017 http://ieeexplore.ieee.org.pitt.idm.oclc.org/stamp/stamp.jsp?a rnumber=7507118 [8] D. Shinder. "The Pros and Cons of Behavioral Based, Signature Based and Whitelist Based Security." TechGenix, 13 Nov. 2008. Accessed. 3.03.2017. http://techgenix.com/pros-cons-behavioral-signaturewhitelist-security/. [9] "What Is the Precise Difference between a Signature Based vs Behavior Based Antivirus?"Information Security Stack Exchange. 28 July 2015. Accessed. 3.03.2017. http://security.stackexchange.com/questions/95186/what-isthe-precise-difference-between-a-signature-based-vsbehavior-based-antiv. [10] Intel Security. “McAfee Host Intrusion Prevention for Desktop”. Advanced vulnerability protection for desktops and laptops. 2015. Accessed 3.03.2017. http://www.mcafee.com/us/products/host-ips-fordesktop.aspx [11] IBM - Proventia desktop endpoint security. “Proventia desktop endpoint security”. Accessed 3.03.2017. https://www-935.ibm.com/services/th/en/itservices/proventia-desktop-endpoint-security.html [12] T. Holland. "Understanding IPS and IDS: Using IPS and IDS Together for Defense in Depth.". 23 Feb. 2004. Accessed. 3.03.2017. https://www.sans.org/readingroom/whitepapers/detection/understanding-ips-ids-ips-idsdefense-in-depth-1381. [13] J. Snyder. "Do You Need an IDS or IPS, or Both?" SearchSecurity. Accessed. 3.03.2017. AN OUTLOOK ON CYBER SECURITY It is the work of a professional, responsible, engineer to develop systems, technologies, and processes keeping in mind the effect on sustainability in hand. Thus, as we continue to append various technologies or upgrading the current HIPS infrastructure, we, as engineers, need to keep economic, moral, ethical dimensions of sustainability in consideration which encircles a bearable, viable, and equitable technology. It’s also likely with the increasing dependence on cyberspace, as hacking continues to exponentially increase, one will have to unfailingly address concerns of breaches in data security and sabotage [19]. Notably, it is imperative to understand that cybersecurity is not merely an engineering and computer science problem, but also an economic and behavioral challenge. Therefore, we believe and recognize that technical initiatives alone will not provide a plausible solution. Hence, cyber security, exigent to much of the world’s infrastructure and sustainability, should no longer an initiative but a collective responsibility. SOURCES [1] D. Kuehl. "From cyberspace to cyber power: Defining the problem." Cyber power and national security. 4.01.2009. Accessed 3.03.2017. 7 Shubham Bhatt Prateek Bhatt http://searchsecurity.techtarget.com/Do-you-need-an-IDS-orIPS-or-both. [14] D. Sequeira. "INTRUSION PREVENTION SYSTEMS – SECURITY’S SILVER BULLET?” Accessed. 3.03.2017. https://www.sans.org/readingroom/whitepapers/detection/intrusion-prevention-systemssecuritys-silver-bullet-366. [15] N. Desai. "Symantec." Symantec Connect. 26 Feb. 2003. Accessed 3.03.2017. https://www.symantec.com/connect/articles/intrusionprevention-systems-next-step-evolution-ids. [16] S. Piper. "Intrusion Prevention System for Dummies." Sourcefire. Accessed. 3.03.2017. http://www.bradreese.com/sourcefire-ips-for-dummies.pdf. [17] "Security: IDS vs. IPS Explained." Compare Business Products. 18 Mar. 2014. Accessed. 3.03.2017. http://www.comparebusinessproducts.com/fyi/ids-vs-ips. [18] G. H. Bruntland. Chapter 2. Our Common Future: Report of the World Commission on Environment and Development. 3.20.1987. Accessed 3.30.2017. http://www.un-documents.net/ocf-02.htm [19] “Summary”. Overview. NAE Grand Challenges For Engineering. 9.14.2015. Accessed 3.03.2017. http://www.engineeringchallenges.org/9042.aspx [20] P. Bhatt, S. Bhatt. Flow chart created for the University of Pittsburgh Spring Conference Paper. 3.03.2017. Reflecting back on the paper, we believe that this paper has been an essential factor in helping us understand technologies outside the curriculum. Hence, thank you all for always being by our side and a sincere gratitude to God for constantly showering his blessings over us. ADDITIONAL SOURCES SECTION J. Bauer. “The New Cybersecurity Agenda: Economic and Social Challenges to a Secure Internet”. 6.04.2015. Accessed 3.03.2017. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=261454 5 M. Gasser. “Building a Secure Computer”. 9.27.2016. Accessed 3.03.2017. https://ece.uwaterloo.ca/~vganesh/TEACHING/S2014/ECE4 58/building-secure-systems.pdf . p.3 L. Padma, N. Reddy, M. Rao. “Host Intrusion Prevention System Using Signature File Method”. IEEE International Advance Computing Conference. 3.7.2009. Accessed 3.03.2017. http://ieeexplore.ieee.org.pitt.idm.oclc.org/stamp/stamp.jsp?t p=&arnumber=4809082 ACKNOWLEDGMENTS Firstly, we would like to take this opportunity to express our deep gratitude to our writing instructors, and professor D. Sanchez, for providing an immense support to write this conference paper. Lastly, but not the least, we would like to thank all library staff, working behind the scenes, who provide us with ample information and resources to gather meaningful information. 8
© Copyright 2025 Paperzz