An intrusion detection system (IDS) gathers and analyzes information from within a computer or a
network to identify any possible violations of security policy, including unauthorized access, as well
as misuse.
Which of the following intrusion detection systems audit events that occur on a specific host?
A.
Network-based intrusion detection
B.
Host-based intrusion detection
C.
Log file monitoring
D.
File integrity checking