Network Security and Management Using HIDS

Download Now
Provided by: International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)
Topic: Networking
Format: PDF
A host based intrusion detection system does not monitor the network traffic rather it monitors what is happening on the actual target machine. It does this by monitoring security event logs or checking for changes to the system. For example changes to critical system files or to the systems registry. The Host based Intrusion Detection System (HIDS). This is mainly for detecting the intrusions that are occurred in the hosts. An intrusion is somebody attempting to break into or misuse the users' computer system. This can be something as severe as stealing confidential data or misusing their email system for spam. An "Intrusion Detection System (IDS)" is mainly for detecting the intrusions.
Download Now

Find By Topic