0% found this document useful (0 votes)
65 views3 pages

HIDS and NIDS

The document discusses host-based intrusion detection systems (HIDS), explaining what they are, how they work, their advantages over network intrusion detection systems, and some key things they can detect like unauthorized access and privilege escalation.

Uploaded by

copoc41907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views3 pages

HIDS and NIDS

The document discusses host-based intrusion detection systems (HIDS), explaining what they are, how they work, their advantages over network intrusion detection systems, and some key things they can detect like unauthorized access and privilege escalation.

Uploaded by

copoc41907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

HIDS?

HIDS stands for “host-based intrusion detection system”. It is an intrusion detection system (a software
application) used to monitor and detect any suspicious activity in a host. It may include intrusions through
external factors and inappropriate use of resources and data by internal factors.

Host-based technology is ‘passive’ in nature, which implies that it is purposed to detect suspicious
activities, not prevent them. Therefore, a Host intrusion detection system is usually used in combination
with intrusion prevention systems (IPS), which are ‘active’ in nature. For a business that wishes to
accomplish more extensive security visibility, host-based intrusion detection systems are generally
stationed on a server and network-based intrusion detection systems (NIDS), which aggregates and
analyses the security events from various sources.

Host-based intrusion detection systems (HIDS) use a sensor identified as ‘HIDS agents‘ installed within
the monitorable assets for detecting threats. A host-based system employs an aggregate of signature-
based and anomaly-based detection systems.

The host-based intrusion detection system (HIDS) can identify multiple attack vectors, including:

 Unapproved login and access efforts


 Escalation of privilege
 Adjustment of application binaries, information, and file configurations
 Installation of undesired applications and associations
 Rogue methods
 Crucial services that have been suspended to run
The accuracy of an IDS ties down to one of four outcomes against the observed event. It could
be:

1. A false positive is an event outcome when IDS has identified an attack but is a
false alarm. These are counted as overhead, often leading to wastage of time and
resources.
2. A false negative is an event outcome when IDS actually missed alerts about the
actual attack. It is the most serious state of all, adding a blind spot for security
teams.
3. A true positive is an event outcome related to the successful identification of an
attack.
4. A true negative is an event outcome when it is right to ignore acceptable
behaviour.

HIDS vs NIDS
Let’s understand the difference between the two.
HIDS monitors the traffic and keeps track of any suspicious actions on the particular host (an
endpoint) installed. Unlike NIDS, HIDS are more informed of incoming security attacks due to
system file and integrity monitoring functionality, keeping an eye on the system files and
processes targeted by attacks.

On the contrary, NIDS monitors network traffic and events. Both HIDS and NIDS operate by
surveying the log files and event information generated by the system. However, NIDS also
analyses packet data as and when data travels through a network. Both the kinds of intrusion
detection systems are diverse as NIDS operate majorly in real-time, tracing live data for
tampering signs. At the same time, HIDS analysis logged records for proof of malicious events.

NIDs vs HIDs: Core Functions


Host-based Intrusion Detection systems examine particular host-based activities,
for example, what software has been used, what documents have been accessed,
and what information resides in the kernel logs. At the same time, the Network
Intrusion Detection systems examine the flow of data between computers (network
traffic). Therefore, NIDs can discover a hacker until he can generate an
unauthorized attack, whereas HIDs will not understand anything is wrong until the
hacker has breached the machine. Both are necessary for sniffing the network for
suspicious activities.

NIDs vs HIDs: Benefits


NIDs Benefits

Where NIDs excel and have the capacity to safeguard countless computing devices
from a network location. This is the best option, which is simpler to deploy and
less costly. NIDs also supply a wider evaluation of a big and corporate network
through scans and probes. Moreover, administrators are able to protect other
devices such as print servers, firewalls, routers and VPN concentrators. NIDs are
flexible with several operating systems and devices and protect the network from
bandwidth floods as well as DoS attacks.

HIDs Benefits

Although HIDs might appear to be a lousy solution, initially they have many
advantages. For starters, they could prevent attacks from causing any damage. As
an example, if a malicious file tries to rewrite a document, the HID will cut off its
rights and quarantine it. Host-based intrusion detection systems may keep laptops
and personal computers protected whenever they are removed or taken off from a
network and into the field. In short, the HIDs are the last line of defense used to
ward off some attacks that are missed by NIDs.

You might also like