Host based Intrusion Detection System

Host based Intrusion Detection System

  • Host intrusion detection systems run on individual hosts or devices on the network.
  • Host-based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyzes the internals of a computing system as well as the network packets on its network.
  • A HIDS monitors the inbound and outbound packets from the device only and will alert the user or administrator if suspicious activity is detected.
  • It takes a snapshot of existing system files and matches it to the previous snapshot.
  • If the critical system files were modified or deleted, the alert is sent to the administrator to investigate.
  • An example of HIDS usage can be seen on mission critical machines, which are not expected to change their configurations.
  • A host-based IDS monitors all or parts of the dynamic behaviour and the state of a computer system.
  • HIDS might detect which program accesses what resources and discover that, for example, a word-processor has suddenly started modifying the system password database.
  • Similarly a HIDS might look at the state of a system, its stored information, whether in RAM, in the file system, log files or elsewhere; and check that the contents of these appear as expected, e.g. have not been changed by intruders.
  • One can think of a HIDS as an agent that monitors whether anything or anyone, whether internal or external, has circumvented the system’s security policy.

You may also like...

Leave a Reply