A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing...
12 KB (1,500 words) - 18:31, 25 May 2025
network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). A system that monitors important operating system files is...
46 KB (5,505 words) - 20:15, 25 July 2025
Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
9 KB (440 words) - 18:02, 16 July 2025
A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
2 KB (281 words) - 12:38, 12 July 2024
anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system...
5 KB (554 words) - 16:44, 4 May 2025
could have happened inside the system would be reported by AIDE. Free Software portal Host-based intrusion detection system comparison "Release 0.19.1"....
4 KB (298 words) - 06:42, 22 September 2023
HIDS may refer to: Host-based intrusion detection system, in computing Hyper-IgD syndrome, in medicine HID (disambiguation) This disambiguation page lists...
383 bytes (49 words) - 16:30, 9 July 2018
automate wireless scanning for large organizations. A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized...
7 KB (848 words) - 19:54, 1 August 2025
Sagan Intrusion detection system (IDS) Intrusion prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project nmap Host-based intrusion...
4 KB (249 words) - 12:12, 29 April 2022
Fail2ban (category Internet Protocol based network software)
DenyHosts, a log-based intrusion-prevention security tool Stockade, a rate-limiting approach to spam mitigation. OSSEC, an open-source host-based intrusion-detection...
8 KB (717 words) - 07:35, 29 December 2024
is based on McAfee, Inc's ePolicy Orchestrator (ePO) and other McAfee point product security applications such as Host Intrusion Prevention System (HIPS)...
14 KB (1,702 words) - 00:01, 13 January 2024
Open Source Tripwire (category Intrusion detection systems)
Natarajan, Ramesh (December 8, 2008). "Tripwire Tutorial: Linux Host Based Intrusion Detection System". The Geek Stuff. Retrieved January 17, 2024. Tripwire,...
16 KB (1,737 words) - 04:32, 3 August 2025
OSSEC (category Intrusion detection systems)
open-source host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based...
4 KB (433 words) - 15:11, 15 March 2025
Unix-like computer operating systems. It can be used both as a security audit tool and a host-based intrusion detection system and supports multiple UNIX...
6 KB (771 words) - 16:05, 8 August 2024
systems, providing malware scanning, intrusion detection and additional guidance for auditors. Free and open-source software portal chkrootkit Host-based...
5 KB (473 words) - 09:05, 30 January 2025
Rootkit (redirect from Rootkit detection)
conference Host-based intrusion detection system Man-in-the-middle attack The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System The process...
69 KB (7,095 words) - 08:50, 1 August 2025
Chkrootkit (category Rootkit detection software)
chkrootkit programs or take other measures to evade detection by them. Host-based intrusion detection system comparison Hardening (computing) Linux malware...
2 KB (194 words) - 06:32, 13 March 2025
Rkhunter (category Rootkit detection software)
software portal chkrootkit Lynis OSSEC Samhain (software) Host-based intrusion detection system comparison Hardening (computing) Linux malware MalwareMustDie...
4 KB (321 words) - 08:35, 1 August 2025
Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
12 KB (1,612 words) - 20:15, 25 July 2025
applications in cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting...
41 KB (4,426 words) - 05:41, 25 June 2025
also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals. Such threat actors' motivations are typically political...
53 KB (4,161 words) - 13:54, 1 August 2025
Device HIDS—Host-based intrusion detection system HIG—Human Interface Guidelines HIPS—Host-based intrusion prevention system HIRD—Hurd of Interfaces...
116 KB (8,238 words) - 05:09, 3 August 2025
Honeypot (computing) (redirect from Military intrusion detection honeypots)
honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and analysis...
28 KB (3,253 words) - 19:52, 19 June 2025
memorandum AIDE (software), (Advanced Intrusion Detection Environment). An open source host-based intrusion detection system Alliance of Independent Democrats...
819 bytes (130 words) - 12:26, 18 October 2024
Dorothy E. Denning (category Computer systems researchers)
information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She...
20 KB (2,204 words) - 14:40, 30 July 2025
credentials Intrusion detection Software inventory management These are several examples of bastion host systems/services: DNS (Domain Name System) server...
4 KB (511 words) - 11:59, 24 November 2024
on 5 March 2013. "samhain The SAMHAIN file integrity / host-based intrusion detection system". Retrieved 3 October 2021. "Botnets, a free tool and 6...
58 KB (4,842 words) - 05:50, 2 July 2025
Network tap (category Intrusion detection systems)
party to listen. Network taps are commonly used for network intrusion detection systems, VoIP recording, network probes, RMON probes, packet sniffers...
19 KB (2,758 words) - 15:33, 26 July 2025
Samhain (software) (category Intrusion detection systems)
is an integrity checker and host intrusion detection system that can be used on single hosts as well as large, UNIX-based networks. It supports central...
2 KB (138 words) - 16:25, 6 July 2025
target network or system, without detection. Evasions are typically used to counter network-based intrusion detection and prevention systems (IPS, IDS) but...
4 KB (523 words) - 22:39, 29 April 2024