HIDS

10 pts.
Tags:
DOD
HIDS
HIPS
Host intrusion detection
IDS
Intrusion detection
Intrusion prevention
IPS
Does host intrusion detection systems use heuristic based detection, which in turn uses a cipher key to determine if an alert should be triggered?
ASKED: May 22, 2008  11:43 AM
UPDATED: May 17, 2013  4:15 PM

Answer Wiki

Thanks. We'll let you know when a new response is added.

HIDS can use various methods of detection. Heuristics or signature based are more like anti-virus products. Network behavior anomaly detection is different. It uses a baseline to compare against current behavior to see if there is something unusual happening that needs attention. Here’s more information about intrusion detection systems.

Discuss This Question:  

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following