An intrusion detection system (IDS) gathers and analyzes information from within a computer or a network to identify any possible violations of security policy, including unauthorized access, as well as misuse.
Which of the following intrusion detection systems audit events that occur on a specific host?
A . Network-based intrusion detection
B . Host-based intrusion detection
C . Log file monitoring
D . File integrity checking
Answer: B