Hived is a extensible tool built on top of the Linux Audit framework that helps to setup honeypots on your linux machines. It provides an extension/plugin API to add custom features depending on your needs.
The Linux Audit framework enables you to log all kinds of events happening on a Linux machine. The Auditd daemon sends these logs to either the audit.log file or the Audispd daemon. This daemon, in short, feeds those logs to various programs that register to it. This is where Hived comes in. It forwards those events to event handlers that analyze them and act accordingly. They could send email notifications to sysadmins, or even take proper action to eliminate a threat. If it can be programmed, it can be done. That is the goal of Hived: Intrusion Detection and Prevention (IPS/IDS).
Hived can also be used in less security-oriented scenarios. For example, it could be a tool to put in place in a CTF box to add more challenge by reacting to the player's actions. Maybe when he does certain actions like accessing an honey pot file, the box could harden its security or cut the connection and reset progress?
Red Hat Documentation - Chapter 7. System Auditing↗
Red Hat - Audit System Reference↗
Refer to this UML class diagram to better understand this section.
There are two main components: Hived and Hivectl.
The daemon ran by Audispd that receives all events recorded by the framework. All events are listened by the AudispdListener, which dynamically loads all event handlers defined in the event_handlers directory and alerts them of new events by following the Observer design pattern. These event handlers can also use notifiers to send out notifications, like emails.
Running Hived on its own has no effect, it needs to be run by Audispd to receive events. However, it allows you to feed it your own logs for testing purposes.
A CLI tool to configure Hived and the Audit framework. It dynamically loads plugins defined in the plugins directory.