Host-Based ID
nounid
2735·updated May 12, 2026candidate
Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. This analysis of the audit trail imposes potentially significant overhead requirements on the system because of the increased amount of processing power which must be utilized by the intrusion detection system. Depending on the size of the audit trail and the processing ability of the system, the review of audit data could result in the loss of a real-time analysis capability.
MWE
Classifications
Entity Type
Capability0%rule-basedmulti_axis_classifier_low_confidence.v1
Sensitivity
—85%llm-generatedllm:claude-haiku-4-5
Information Class
—90%llm-generatedllm:claude-haiku-4-5
Variants
- plural
- Host-Based IDS
- possessive
- Host-Based ID's
- pluralpossessive
- Host-Based IDS'
Framework definitions
- §1
- Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. This analysis of the audit trail imposes potentially significant overhead requirements on the system because of the increased amount of processing power which must be utilized by the intrusion detection system. Depending on the size of the audit trail and the processing ability of the system, the review of audit data could result in the loss of a real-time analysis capability.
Outgoing relationships
No outgoing triples
This term is not the subject of any RDF-style relationship yet.
Incoming relationships
No incoming triples
No other term currently asserts a relationship to this one.