Let's learn today on IDS - Intrusion Detection Systems: isoeh
NIDS vs HIDS
An agent on a host identifying intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability databases, Access control lists, etc.) and other host activities and state.
In a HIDS, sensors usually consist of a software agent. Some application-based IDS are also part of this category. An example of a HIDS is OSSEC.
Platform identifying intrusions by examining network traffic and monitors multiple hosts.
PIDS vs VMDS
Detect intrusions using virtual machine monitoring.