Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What is a Host Intrusion Detection System?

detection host intrusion system
0
10 Posted

What is a Host Intrusion Detection System?

0

Host based intrusion detection (HIDS) refers to intrusion detection that takes place on a single host system. Currently, HIDS involves installing an agent on the local host that monitors and reports on the system configuration and application activity. Some common abilities of HIDS systems include log analysis, event correlation, integrity checking, policy enforcement, rootkit detection, and alerting1. They often also have the ability to baseline a host system to detect variations in system configuration. In specific vendor implementations these HIDS agents also allow connectivity to other security systems. For example, Cisco CSA has the ability to send host data upstream to Cisco network IPS devices2, Checkpoint Integrity can be integrated with Checkpoint Secure Client (Client VPN)3, and IBM Proventia Desktop is Cisco NAC certified.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.