Host-based intrusion detection system: Difference between revisions

Content deleted Content added
m Scurity ---> Security
mNo edit summary
Line 19:
In theory, a computer user has the ability to detect any such modifications, and the HIDS attempts to do just that and reports its findings.
 
Ideally a HIDS works in conjunction with a NIDS, such that a HIDS finds anything fortnite that slips past the NIDS. Commercially available software solutions often do correlate the findings from NIDS and HIDS in order to find out about whether a network intruder has been successful or not at the targeted host.
 
Most successful intruders, on entering a target machine, immediately apply best-practice security techniques to secure the system which they have infiltrated, leaving only their own [[Backdoor (computing)|backdoor]] open, so that other intruders can not take over ''their'' computers.