• A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing...
    12 KB (1,500 words) - 18:31, 25 May 2025
  • network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). A system that monitors important operating system files is...
    46 KB (5,505 words) - 20:15, 25 July 2025
  • Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
    9 KB (440 words) - 18:02, 16 July 2025
  • A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
    2 KB (281 words) - 12:38, 12 July 2024
  • HIDS may refer to: Host-based intrusion detection system, in computing Hyper-IgD syndrome, in medicine HID (disambiguation) This disambiguation page lists...
    383 bytes (49 words) - 16:30, 9 July 2018
  • anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system...
    5 KB (554 words) - 16:44, 4 May 2025
  • automate wireless scanning for large organizations. A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized...
    7 KB (848 words) - 19:54, 1 August 2025
  • Sagan Intrusion detection system (IDS) Intrusion prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project nmap Host-based intrusion...
    4 KB (249 words) - 12:12, 29 April 2022
  • could have happened inside the system would be reported by AIDE. Free Software portal Host-based intrusion detection system comparison "Release 0.19.1"....
    4 KB (298 words) - 06:42, 22 September 2023
  • OSSEC (category Intrusion detection systems)
    open-source host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based...
    4 KB (433 words) - 15:11, 15 March 2025
  • systems, providing malware scanning, intrusion detection and additional guidance for auditors. Free and open-source software portal chkrootkit Host-based...
    5 KB (473 words) - 09:05, 30 January 2025
  • Open Source Tripwire (category Intrusion detection systems)
    methods.: 15  Free and open-source software portal AIDE Host-based intrusion detection system comparison OSSEC Samhain "LICENSE". Github. Retrieved 5...
    16 KB (1,737 words) - 04:32, 3 August 2025
  • Thumbnail for Chkrootkit
    Chkrootkit (category Rootkit detection software)
    chkrootkit programs or take other measures to evade detection by them. Host-based intrusion detection system comparison Hardening (computing) Linux malware...
    2 KB (194 words) - 06:32, 13 March 2025
  • Thumbnail for Rkhunter
    Rkhunter (category Rootkit detection software)
    software portal chkrootkit Lynis OSSEC Samhain (software) Host-based intrusion detection system comparison Hardening (computing) Linux malware MalwareMustDie...
    4 KB (321 words) - 08:35, 1 August 2025
  • Thumbnail for Fail2ban
    Fail2ban (category Internet Protocol based network software)
    DenyHosts, a log-based intrusion-prevention security tool Stockade, a rate-limiting approach to spam mitigation. OSSEC, an open-source host-based intrusion-detection...
    8 KB (717 words) - 07:35, 29 December 2024
  • Unix-like computer operating systems. It can be used both as a security audit tool and a host-based intrusion detection system and supports multiple UNIX...
    6 KB (771 words) - 16:05, 8 August 2024
  • is based on McAfee, Inc's ePolicy Orchestrator (ePO) and other McAfee point product security applications such as Host Intrusion Prevention System (HIPS)...
    14 KB (1,702 words) - 00:01, 13 January 2024
  • Thumbnail for Honeypot (computing)
    honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and analysis...
    28 KB (3,253 words) - 19:52, 19 June 2025
  • Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
    12 KB (1,612 words) - 20:15, 25 July 2025
  • Rootkit (redirect from Rootkit detection)
    conference Host-based intrusion detection system Man-in-the-middle attack The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System The process...
    69 KB (7,095 words) - 08:50, 1 August 2025
  • applications in cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting...
    41 KB (4,426 words) - 05:41, 25 June 2025
  • Device HIDS—Host-based intrusion detection system HIG—Human Interface Guidelines HIPS—Host-based intrusion prevention system HIRD—Hurd of Interfaces...
    118 KB (8,338 words) - 05:01, 4 August 2025
  • credentials Intrusion detection Software inventory management These are several examples of bastion host systems/services: DNS (Domain Name System) server...
    4 KB (511 words) - 11:59, 24 November 2024
  • memorandum AIDE (software), (Advanced Intrusion Detection Environment). An open source host-based intrusion detection system Alliance of Independent Democrats...
    819 bytes (130 words) - 12:26, 18 October 2024
  • also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals. Such threat actors' motivations are typically political...
    53 KB (4,161 words) - 13:54, 1 August 2025
  • Samhain (software) (category Intrusion detection systems)
    is an integrity checker and host intrusion detection system that can be used on single hosts as well as large, UNIX-based networks. It supports central...
    2 KB (138 words) - 16:25, 6 July 2025
  • on 5 March 2013. "samhain The SAMHAIN file integrity / host-based intrusion detection system". Retrieved 3 October 2021. "Botnets, a free tool and 6...
    58 KB (4,842 words) - 05:50, 2 July 2025
  • Thumbnail for Dorothy E. Denning
    Dorothy E. Denning (category Computer systems researchers)
    information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She...
    20 KB (2,204 words) - 14:40, 30 July 2025
  • often include authentication, anti-virus, anti-malware/spyware, intrusion detection, penetration testing and security event management, among others...
    28 KB (3,089 words) - 00:52, 27 July 2025
  • Sagan (software) (category Intrusion detection systems)
    execution on event detection, GeoIP detection/alerting and time sensitive alerting. Free Software portal Host-based intrusion detection system comparison "Sagan...
    4 KB (164 words) - 20:32, 10 April 2025