HIDS and NIDS by Eric Rivers
Go Back
Host Based Intrusion Detection (HIDS) system
Refers to Intrusion Detection that takes place on a single host system. Currently, HIDS involves installing an agent on the local host that monitors and reports on the system configuration and application activity.
Key Points about HIDS
1) Detects malicious activity
2) Gathers data about malicious activity and reports to IT (Logging & Reporting)
3) Software based
4) Associated only with the host / end point device that it is installed on
5) Users or hackers can uninstall the application and pose a security risk
Network based (NIDS) intrusion detection system
NIDS is a Network Security System focusing on the attacks that come from the inside of the network (authorized users).
Key Points about NIDS
1) Detects malicious activity
2) Gathers data about malicious activity and reports to IT (Logging & Reporting)
3) Hardware / Appliance based
4) In order to ensure stability and high availability the equipment must be configured in a high availability manner along with redundant equipment.
What they do?
1) Monitor system and user activity
2) Audits system configuration to ensure no changes have occurred
3) Audits system for vulnerabilities and misconfigurations
4) Assesses the integrity of critical system and data files
5) Recognizes / identifies known attack patterns
6) Identifies abnormal activity
7) Manages audit trail and highlights user violations of policy or abnormal behavior
Created on August 29, 2015 by Lionel Sharpe || Professor Eric Rivers at 3:39 AM
Form (rr15a) Code:3301627005-GA
Form (rr15b) Code:3301627006-NJ
Form (rr15c) Code:3301627007-FL
Copyright © 2013 Bridgetonia Inc.|| All Rights Reserved