nav-img
Advanced

Alarm Events

HSS generates alarms on 13 types of intrusion events, including brute-force attacks, abnormal process behavior, web shells, abnormal logins, and malicious processes. You can learn all these events on the HSS console and eliminates security risks in your assets in a timely manner.

Alarm Events

Alarm Name

Description

Basic

Enterprise

Premium

WTP

Brute-force attack

If hackers log in to your servers through brute-force attacks, they can obtain the control permissions of the servers and perform malicious operations, such as steal user data; implant ransomware, miners, or Trojans; encrypt data; or use your servers as zombies to perform DDoS attacks.

Detect brute-force attacks on SSH, RDP, FTP, SQL Server, and MySQL accounts.

  • If the number of brute-force attacks from an IP address reaches 5 within 30 seconds, the IP address will be blocked.

    By default, suspicious SSH attackers are blocked for 12 hours. Other types of suspicious attackers are blocked for 24 hours.

  • You can check whether the IP address is trustworthy based on its attack type and how many times it has been blocked. You can manually unblock the IP addresses you trust.

Abnormal login

Detect abnormal login behavior, such as remote login and brute-force attacks. If abnormal logins are reported, your servers may have been intruded by hackers.

  • Check and handle remote logins.

    You can check the blocked login IP addresses, and who used them to log in to which server at what time.

    If a user's login location is not any common login location you set, an alarm will be triggered.

  • Trigger an alarm if a user logs in by a brute-force attack.

Malicious program (cloud scan)

Malicious programs include Trojans and web shells implanted by hackers to steal your data or control your servers.

For example, hackers will probably use your servers as miners or DDoS zombies. This occupies a large number of CPU and network resources, affecting service stability.

Check malware, such as web shells, Trojan horses, mining software, worms, and other viruses and variants, and kill them in one click. The malware is found and removed by analysis on program characteristics and behaviors, AI image fingerprint algorithms, and cloud scanning and killing.

×

(Isolate and kill)

(Isolate and kill)

(Isolate and kill)

Abnormal process behavior

Check the processes on servers, including their IDs, command lines, process paths, and behavior.

Send alarms on unauthorized process operations and intrusions.

The following abnormal process behavior can be detected:

  • Abnormal CPU usage
  • Processes accessing malicious IP addresses
  • Abnormal increase in concurrent process connections

×

Critical file change

If hackers intrude into your system, they will probably tamper with important system files to forge identities or prepare for further attacks.

  • Check alarms about modifications on key files (such as ls, ps, login, and top). For details about the monitored paths, see Monitored Important File Paths.
  • Key file change information includes the paths of modified files, the last modification time, and names of the servers storing configuration files.
  • You can add fingerprint libraries of critical files, so that HSS can better collect critical file information and detect exceptions.

HSS only checks whether directories or files have been modified, not whether they are modified manually or by a process.

×

Web shell

A web shell is a command execution environment in the form of web page files, such as PHP and JSP files.

After hacking a website, a hacker usually puts a web shell among normal web page files in the web directory of a website server, and then accesses the web shell through a browser to control the server.

Check whether the files (often PHP and JSP files) in your web directories are web shells.

  • Web shell information includes the Trojan file path, status, first discovery time, and last discovery time. You can choose to ignore warning on trusted files.
  • You can use the manual detection function to detect web shells on servers.

×

Reverse shell

Monitor user process behaviors in real time to detect reverse shells caused by invalid connections.

Reverse shells can be detected for protocols including TCP, UDP, and ICMP.

You can configure the reverse shell detection rule on the Policies page. HSS will check for suspicious or remotely executed commands.

×

×

Abnormal shell

Detect actions on abnormal shells, including moving, copying, and deleting shell files, and modifying the access permissions and hard links of the files.

You can configure the reverse shell detection rule on the Policies page. HSS will check for suspicious or remotely executed commands.

×

×

High-risk command execution

You can configure what commands will trigger alarms in the High-risk command detection rule on the Policies page.

HSS checks executed commands in real time and generates alarms if high-risk commands are detected.

×

×

Auto-startup check

Trojans usually intrude servers by creating auto-started services, scheduled tasks, or preloaded dynamic libraries. The auto-startup check function collects information about all auto-started items, including their names, types, and number of affected servers.

HSS checks and lists auto-started services, scheduled tasks, pre-loaded dynamic libraries, run registry keys, and startup folders.

×

×

Unsafe account

Hackers can probably crack unsafe accounts on your servers and control the servers.

HSS checks suspicious hidden accounts and cloned accounts and generates alarms on them.

×

Privilege escalation

After hackers intrude servers, they will try exploiting vulnerabilities to grant themselves the root permissions or add permissions for files. In this way, they can illegally create system accounts, modify account permissions, and tamper with files.

HSS detects privilege escalation for processes and files in the current system.

The following abnormal privilege escalation operations can be detected:

  • Root privilege escalation by exploiting SUID program vulnerabilities
  • Root privilege escalation by exploiting kernel vulnerabilities
  • File privilege escalation

×

×

Rootkit

HSS detects suspicious rootkit installation in a timely manner by checking:

  • Rootkits based on file signatures
  • Hidden files, ports, and processes

×

×

Monitored Important File Paths

Type

Linux

bin

/bin/ls

/bin/ps

/bin/bash

/bin/netstat

/bin/login

/bin/find

/bin/lsmod

/bin/pidof

/bin/lsof

/bin/ss

usr

/usr/bin/ls

/usr/bin/ps

/usr/sbin/ps

/usr/bin/bash

/usr/bin/netstat

/usr/sbin/netstat

/usr/sbin/rsyslogd

/usr/sbin/ifconfig

/usr/bin/login

/usr/bin/find

/usr/sbin/lsmod

/usr/sbin/pidof

/usr/bin/lsof

/usr/sbin/lsof

/usr/sbin/tcpd

/usr/bin/passwd

/usr/bin/top

/usr/bin/du

/usr/bin/chfn

/usr/bin/chsh

/usr/bin/killall

/usr/bin/ss

/usr/sbin/ss

/usr/bin/ssh

/usr/bin/scp

sbin

/sbin/syslog-ng

/sbin/rsyslogd

/sbin/ifconfig

/sbin/lsmod

/sbin/pidof