answersLogoWhite

0


Best Answer

Host intrusion detection software or devices are made to monitor your system or network activities for malicious or policy violations. Not all of them actually stop the intrusion, however.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Host intrusion detection systems or HIDS are used for what purpose?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What can you use for detecting security issue at host level?

There are several tools that can be used to detect security issues at the host level. Some popular options include antivirus software, intrusion detection systems, vulnerability scanners, and log analysis tools. These tools can help identify malware, suspicious network activity, vulnerabilities, and unusual behavior on the host system, allowing for timely detection and mitigation of security threats.


Some HIDS use heuristic based detection which in turn use a cipher key to determine if an alert should be triggered?

true


A Hybrid IDS is a combination of which types of IDS?

HIDS and NIDS


How does a network-based IDS differ from a host-based IDS?

FunctionHIDSNIDSCommentsProtection on LAN********Both systems protect you on your LANProtection off LAN****-Only HIDS protects you when you are off the LANEase of Administration********The admin of NIDS and HIDS is equal from a central admin perspective.Versatility******HIDS are more versatile systems.Price****HIDS are more affordable systems if the right product is chosen.Ease of Implementation********Both NIDS and HIDS are equal form a central control perspectiveLittle Training required******HIDS requires less training than NIDSTotal cost of ownership*****HIDS cost you less to own in the long runBandwidth requirements on (LAN)02NIDS uses up LAN bandwidth. HIDS does not.Network overhead12The NIDS has double the total network bandwidth requirements from any LANBandwidth requirements (internet)****Both IDS need internet bandwidth to keep the pattern files currentSpanning port switching requirements-****NIDS requires that port spanning be enabled to ensure that your LAN traffic is scanned.Update frequency to clients****-HIDS updates all of the clients with a central pattern file.Cross platform compatibility******NIDS are more adaptable to cross platform environments.Local machine registry scans****-Only HIDS can do these types of scans.Logging******Both systems have logging functionalityAlarm functions******Both systems alarm the individual and the administrator.PAN scan****-Only HIDS scan you personal area networks. (unless you have the $ to get a NIDS for your home)Packet rejection-****Only NIDS functions in this mode.Specialist knowledge*******More knowledge is required when installing and understanding how to use NIDS from a network security perspective.Central management*****NIDS are more centrally managed.Disable risk factor*****NIDS failure rate is much higher than HIDS failure rate. NIDS has one point of failure.Upgrade potential******It is easier to upgrade software than hardware. HIDS can be upgraded through a centralized script. NIDS is typically flashed onto the flash memory and has low overhead.


What are advantages of HIDS over NIDS?

less expensive


What is the plural of hid?

The plural of "hid" is "hids."


Which technology is responsible for monitoring the system for policy violations?

Hids


The drummer's name from the band Stereos?

Aaron Verdonk--- He is sooooo hids!


What type of headlights are in the kenworth T660?

You have a choice of halogen (H4, IIRC) or you can get HIDs.


Some HIDS use heuristic based detection which in turn uses a cipher key to determine if an alert should be triggered?

truerevision: False.Why?Along with built in checksum monitoring to identify file integrity some will also incorporate heuristic based signature which uses an algorithm to determine whether or not an alarm should be triggered.


What kind of subs should you get for BMW 745i?

I already have: 10k HIDS low beam 20K HIDS true blue fog lamps tinted tailights tinted headlights tinted windows 2 JL W7 subs.... what else should I get?


Which technology is responsible for monitoring the system for the policy as well as assessing password security for device on the network?

HIDS