Host-based intrusion detection system comparison

This is an old revision of this page, as edited by Tim@ (talk | contribs) at 19:47, 17 April 2017. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

As per the Unix philosophy a good HIDS is composed of multipule packages each focusing on a specific aspect.

Package Year[1] Linux Windows File Network Logs Notes
.
  1. ^ Last updated