Content deleted Content added
m →References: http→https for Google Books and Google News using AWB |
Remove See Also items already covered + WP:OVERLINK + copyedit |
||
Line 1:
{{Refimprove|date=July 2011}}
A '''host-based intrusion detection system''' ('''HIDS''') is an [[intrusion detection system]] that monitors and analyzes the internals of a computing system as well as (in some cases) the network packets on its network interfaces (just like a
== Overview ==
{{Original research|section|date=July 2011}}
A host-based IDS monitors all or parts of the dynamic behavior and the state of a computer system. Besides such activities
One can think of a HIDS as an [[software agent|agent]] that monitors whether anything or anyone, whether internal or external, has circumvented the system's [[security policy]].
=== Monitoring dynamic behavior ===
Many computer users have encountered tools that monitor dynamic system behaviour in the form of [[anti-virus software|anti-virus]] (AV) packages. While AV programs often also monitor system state, they do spend a lot of their time looking at who is doing what inside a computer – and whether a given program should or should not have access to particular system resources. The lines become
[[Intrusion prevention
=== Monitoring state ===
Line 51:
==See also==
* [[IBM Internet Security Systems]] – commercial HIDS / NIDS
* [[OSSEC]] – a multi-platform open source HIDS
* [[Tripwire (software)]] – commercial HIDS
* [[Trusted Computing Group]]
* [[Verisys]] – commercial HIDS
|