A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing...
12 KB (1,500 words) - 18:31, 25 May 2025
network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). A system that monitors important operating system files is...
46 KB (5,505 words) - 20:15, 25 July 2025
Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
9 KB (440 words) - 18:02, 16 July 2025
A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
2 KB (281 words) - 12:38, 12 July 2024
HIDS may refer to: Host-based intrusion detection system, in computing Hyper-IgD syndrome, in medicine HID (disambiguation) This disambiguation page lists...
383 bytes (49 words) - 16:30, 9 July 2018
anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system...
5 KB (554 words) - 16:44, 4 May 2025
automate wireless scanning for large organizations. A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized...
7 KB (848 words) - 19:54, 1 August 2025
Sagan Intrusion detection system (IDS) Intrusion prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project nmap Host-based intrusion...
4 KB (249 words) - 12:12, 29 April 2022
could have happened inside the system would be reported by AIDE. Free Software portal Host-based intrusion detection system comparison "Release 0.19.1"....
4 KB (298 words) - 06:42, 22 September 2023
OSSEC (category Intrusion detection systems)
open-source host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based...
4 KB (433 words) - 15:11, 15 March 2025
systems, providing malware scanning, intrusion detection and additional guidance for auditors. Free and open-source software portal chkrootkit Host-based...
5 KB (473 words) - 09:05, 30 January 2025
Open Source Tripwire (category Intrusion detection systems)
methods.: 15 Free and open-source software portal AIDE Host-based intrusion detection system comparison OSSEC Samhain "LICENSE". Github. Retrieved 5...
16 KB (1,737 words) - 04:32, 3 August 2025
Chkrootkit (category Rootkit detection software)
chkrootkit programs or take other measures to evade detection by them. Host-based intrusion detection system comparison Hardening (computing) Linux malware...
2 KB (194 words) - 06:32, 13 March 2025
Rkhunter (category Rootkit detection software)
software portal chkrootkit Lynis OSSEC Samhain (software) Host-based intrusion detection system comparison Hardening (computing) Linux malware MalwareMustDie...
4 KB (321 words) - 08:35, 1 August 2025
Fail2ban (category Internet Protocol based network software)
DenyHosts, a log-based intrusion-prevention security tool Stockade, a rate-limiting approach to spam mitigation. OSSEC, an open-source host-based intrusion-detection...
8 KB (717 words) - 07:35, 29 December 2024
Unix-like computer operating systems. It can be used both as a security audit tool and a host-based intrusion detection system and supports multiple UNIX...
6 KB (771 words) - 16:05, 8 August 2024
is based on McAfee, Inc's ePolicy Orchestrator (ePO) and other McAfee point product security applications such as Host Intrusion Prevention System (HIPS)...
14 KB (1,702 words) - 00:01, 13 January 2024
Honeypot (computing) (redirect from Military intrusion detection honeypots)
honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and analysis...
28 KB (3,253 words) - 19:52, 19 June 2025
Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
12 KB (1,612 words) - 20:15, 25 July 2025
Rootkit (redirect from Rootkit detection)
conference Host-based intrusion detection system Man-in-the-middle attack The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System The process...
69 KB (7,095 words) - 08:50, 1 August 2025
applications in cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting...
41 KB (4,426 words) - 05:41, 25 June 2025
Device HIDS—Host-based intrusion detection system HIG—Human Interface Guidelines HIPS—Host-based intrusion prevention system HIRD—Hurd of Interfaces...
118 KB (8,338 words) - 05:01, 4 August 2025
credentials Intrusion detection Software inventory management These are several examples of bastion host systems/services: DNS (Domain Name System) server...
4 KB (511 words) - 11:59, 24 November 2024
memorandum AIDE (software), (Advanced Intrusion Detection Environment). An open source host-based intrusion detection system Alliance of Independent Democrats...
819 bytes (130 words) - 12:26, 18 October 2024
also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals. Such threat actors' motivations are typically political...
53 KB (4,161 words) - 13:54, 1 August 2025
Samhain (software) (category Intrusion detection systems)
is an integrity checker and host intrusion detection system that can be used on single hosts as well as large, UNIX-based networks. It supports central...
2 KB (138 words) - 16:25, 6 July 2025
on 5 March 2013. "samhain The SAMHAIN file integrity / host-based intrusion detection system". Retrieved 3 October 2021. "Botnets, a free tool and 6...
58 KB (4,842 words) - 05:50, 2 July 2025
Dorothy E. Denning (category Computer systems researchers)
information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She...
20 KB (2,204 words) - 14:40, 30 July 2025
often include authentication, anti-virus, anti-malware/spyware, intrusion detection, penetration testing and security event management, among others...
28 KB (3,089 words) - 00:52, 27 July 2025
Sagan (software) (category Intrusion detection systems)
execution on event detection, GeoIP detection/alerting and time sensitive alerting. Free Software portal Host-based intrusion detection system comparison "Sagan...
4 KB (164 words) - 20:32, 10 April 2025