BUKAČ, Vít and Václav MATYÁŠ. Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges. In Antonio Ruiz-Martinez, Rafael Marin-Lopez, Fernando Pereniguez-Garcia. Architectures and Protocols for Secure Information Technology Infrastructures. Hershey, PA, United States: IGI Global, 2014, p. 184-214. Advances in Information Security, Privacy, and Ethics (AISPE). ISBN 978-1-4666-4514-1. Available from: https://dx.doi.org/10.4018/978-1-4666-4514-1.ch007.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges
Authors BUKAČ, Vít (203 Czech Republic, guarantor, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution).
Edition Hershey, PA, United States, Architectures and Protocols for Secure Information Technology Infrastructures, p. 184-214, 31 pp. Advances in Information Security, Privacy, and Ethics (AISPE), 2014.
Publisher IGI Global
Other information
Original language English
Type of outcome Chapter(s) of a specialized book
Field of Study 20206 Computer hardware and architecture
Country of publisher Czech Republic
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
RIV identification code RIV/00216224:14330/14:00073208
Organization unit Faculty of Informatics
ISBN 978-1-4666-4514-1
Doi http://dx.doi.org/10.4018/978-1-4666-4514-1.ch007
Keywords in English IDS; HIDS; standalone HIDS; host-based IDS; cloud-based IDS; collaborative IDS
Tags best1
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 1/4/2015 09:01.
Abstract
The reader explores both the founding ideas and the state-of-the-art research on host-based intrusion detection systems. HIDSs are categorized by their intrusion detection method. Each category is thoroughly investigated, and its limitations and benefits are discussed. Seminal research findings and ideas are presented and supplied with comments. Separate sections are devoted to the protection against tampering and to the HIDS evasion techniques that are employed by attackers. Existing research trends are highlighted, and possible future directions are suggested.
Links
VG20102014031, research and development projectName: Experimentální vývoj bezpečnostní softwarové platformy se systémem detekce průniku a režimy ochrany soukromí pro bezdrátové senzorové sítě (Acronym: WSNSec)
Investor: Ministry of the Interior of the CR
PrintDisplayed: 30/4/2024 17:54