Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges

Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges

Author: 
Buka?, Vít
Place: 
Hershey
Publisher: 
IGI Global
Date published: 
2013
Responsibility: 
Matyáš, Vashek, jt.author
Editor: 
Ruiz-Martinez, Antonio
Journal Title: 
Architectures and Protocols for Secure Information Technology Infrastructures
Source: 
Architectures and Protocols for Secure Information Technology Infrastructures
Abstract: 

In this chapter, the reader explores both the founding ideas and the state-of-the-art research on host-based intrusion detection systems. HIDSs are categorized by their intrusion detection method. Each category is thoroughly investigated, and its limitations and benefits are discussed. Seminal research findings and ideas are presented and supplied with comments. Separate sections are devoted to the protection against tampering and to the HIDS evasion techniques that are employed by attackers. Existing research trends are highlighted, and possible future directions are suggested.

Series: 
Advances in Information Security, Privacy, and Ethics

CITATION: Buka?, Vít. Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges edited by Ruiz-Martinez, Antonio . Hershey : IGI Global , 2013. Architectures and Protocols for Secure Information Technology Infrastructures - Available at: https://library.au.int/host–based-intrusion-detection-systems-architectures-solutions-and-challenges