Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "HIDS"
From NetSec
MargeryLeddy (Talk | contribs) |
|||
Line 7: | Line 7: | ||
* http://en.wikipedia.org/wiki/Host-based_intrusion_detection_system | * http://en.wikipedia.org/wiki/Host-based_intrusion_detection_system | ||
− | + | {{expand}}{{countermeasures}} |
Revision as of 04:13, 19 May 2012
A Host-based Intrusion Detection System (HIDS) focuses on performing several intrusion detection mechanisms in a single host or computer, ensuring the integrity of it by searching for malicious or anomalous activity. It's an agent that monitors and reports on the system status, its stored information, and application activity. Some common features of HIDS systems include log analysis, real-time alerting, event correlation, integrity checking, policy enforcement, and rootkit detection.
External Links
- http://www.sans.org/security-resources/idfaq/what_is_hips.php
- http://www.ossec.net/
- http://en.wikipedia.org/wiki/Host-based_intrusion_detection_system
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|
HIDS is part of a series on countermeasures.