| 
View
 

Host-Based-Intrusion-Detection

Page history last edited by Patrick 6 years, 1 month ago

Overview

You've worked with network intrusion detection systems, systems that identify anomalous packets or streams as they cross through your network.  A second type of intrusion detection system is the host-based IDS (HIDS).  HIDS work typically by calculating a hash of important files and encrypting these hashes ina a database. On a certain schedule the HIDS will recalculate the hashes and compare it to those in the encrypted database. If the hashes don't match, something hash changed. In this section I discuss HIDS, and demonstrate a well-known (now commercial) HIDS, Tripwire.

Videos

 

Readings

 

Additional Resources:

 

Comments (0)

You don't have permission to comment on this page.