HIDS vs NIDS: Host vs Network Intrusion Detection
Compare Host-based (HIDS) and Network-based (NIDS) intrusion detection systems to understand their differences and uses. π

ISO Training Institute
46.7K views β’ Jan 25, 2017

About this video
IDS| HIDS Vs NIDS| Host based Intrusion Detection System Vs Network Based Intrusion Detection System | IDS Types
Network Intrusion Detection Systems (NIDS) usually consists of a network appliance (or sensor) with a Network Interface Card (NIC) operating in promiscuous mode and a separate management interface. The IDS is placed along a network segment or boundary and monitors all traffic on that segment.
A Host Intrusion Detection Systems (HIDS) and software applications (agents) installed on workstations which are to be monitored. The agents monitor the operating system and write data to log files and/or trigger alarms. A host Intrusion detection systems (HIDS) can only monitor the individual workstations on which the agents are installed and it cannot monitor the entire network. Host based IDS systems are used to monitor any intrusion attempts on critical servers.
The drawbacks of Host Intrusion Detection Systems (HIDS) are
β’ Difficult to analyse the intrusion attempts on multiple computers.
β’ Host Intrusion Detection Systems (HIDS) can be very difficult to maintain in large networks with different operating systems and configurations
β’ Host Intrusion Detection Systems (HIDS) can be disabled by attackers after the system is compromised.
Network Intrusion Detection Systems (NIDS) usually consists of a network appliance (or sensor) with a Network Interface Card (NIC) operating in promiscuous mode and a separate management interface. The IDS is placed along a network segment or boundary and monitors all traffic on that segment.
A Host Intrusion Detection Systems (HIDS) and software applications (agents) installed on workstations which are to be monitored. The agents monitor the operating system and write data to log files and/or trigger alarms. A host Intrusion detection systems (HIDS) can only monitor the individual workstations on which the agents are installed and it cannot monitor the entire network. Host based IDS systems are used to monitor any intrusion attempts on critical servers.
The drawbacks of Host Intrusion Detection Systems (HIDS) are
β’ Difficult to analyse the intrusion attempts on multiple computers.
β’ Host Intrusion Detection Systems (HIDS) can be very difficult to maintain in large networks with different operating systems and configurations
β’ Host Intrusion Detection Systems (HIDS) can be disabled by attackers after the system is compromised.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
46.7K
Likes
355
Duration
2:15
Published
Jan 25, 2017
User Reviews
4.2
(9) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.