HID

(redirected from Host Intrusion Detection)
AcronymDefinition
HIDHigh-Intensity Discharge (automobiles lights)
HIDHuman Interface Devices (e.g. keyboards & mice)
HIDHealth Information Designs (various locations)
HIDHuman Interactive Device
HIDHardware Id
HIDHigh Intensity Discharger
HIDHuman Input Device
HIDHuman Interface Device
HIDHigh Intensity Discharge
HIDHot Import Daze (cars)
HIDHardware Interface Device
HIDHazard Identification (NIOSH)
HIDHost Intrusion Detection (network and host security)
HIDHazardous Installations Directorate (United Kingdom)
HIDHost Interface Device
HIDHandbook on Injectable Drugs
HIDHoliday In Dixie (Shreveport, LA, USA)
HIDHellenic Info Destination (Greece)
HIDHigh Incidence Disabilities
HIDHost Interface Display
HIDHomogeneous Isotropic Dielectric (air)
References in periodicals archive ?
[12] proposed a system-call-language-modeling method based on LSTM for designing an anomaly-based host intrusion detection system.
For example, for the HMM-based host intrusion detection is shown in Figure 4.
The general IDS of rootkit mainly adopted host-based architecture and the network-based architecture, which are commonly referred to as HIDS (Host Intrusion Detection System) and NIDS (Network Intrusion Detection Systems) respectively [8].
Usually, intrusion detection systems are categorized into three types based on whether an intrusion detection system observes a network, a host, or both specifically in relation to network intrusion detection systems (NIDS) as described by (Dhruba and Pels, 2005), host intrusion detection systems (HIDS), or distributed intrusion detection systems (DIDS).
Perimeter protection MSS include firewalls, email security gateways, network intrusion detection, host intrusion detection and unified threat management.
Encompassing a broad portfolio of premises-based security hardware, the service supports capabilities, such as firewall, network and host intrusion detection and prevention, unified threat management and e-mail security gateway.
In the report, IDC defines the server security category as: EoACA[pounds sterling]Solutions [that] include antimalware, desktop firewall, and host intrusion detection and prevention software that is designed to maintain the integrity of servers.
Since 2005, Trend Micro, Cupertino, Calif.,has been providing advanced, network-level host intrusion detection and prevention (IDS/IPS) capabilities to enterprises, protecting servers, desktops and laptops from attacks that target application and operating system vulnerabilities.
Third Brigade also owns and maintains OSSEC, the Open Source Host Intrusion Detection Project actively used in 50 countries around the world.
To ensure the highest levels of availability on the network, the host level monitoring capability--called host intrusion detection system (HIDS)--is recommended.
The system will comprise existing Cisco products, including its Security Agent host intrusion detection software and its Radius policy server.
The company has made an analysis of purchase intents and found that there is short-term interest in network and host intrusion detection and a long-term interest in several types of intrusion detection.