Definitions for "HIDS "
This is a Host based Intrusion Detection system, it consists of 4 components viz.Port scan detector,Policy Enforcer,Network Statistics,and Vulnerability detector. The backend programs are written in C, the front end is made using Qt Designer and Glade.
A program that resides on servers and other computer systems designed to detect intrusions on that specific system. The most common methods used by an HIDS to detect intrusions are to monitor system logs or integrate APIs into the system that look for changes or modifications made to protected areas. The drawback to these approaches is that any system protected by an HIDS must have the program loaded onto the system (considered an intrusive solution), creating a management burden of loading additional software, maintaining the software and "touching" each system that needs to be protected. An HIDS is often a good complement to an NIDS.