Statements (27)
Predicate | Object |
---|---|
gptkbp:instanceOf |
intrusion prevention system
|
gptkbp:analyzes |
system logs
system calls file integrity |
gptkbp:can_be_open_source |
yes
|
gptkbp:canBe |
forensics
compliance monitoring |
gptkbp:commercialUse |
yes
|
gptkbp:detects |
rootkits
policy violations malicious activity unauthorized changes |
gptkbp:distinctFrom |
gptkb:NIDS
|
gptkbp:example |
gptkb:Tripwire
AIDE OSSEC |
gptkbp:focusesOn |
individual hosts
|
gptkbp:generation |
alerts
|
https://www.w3.org/2000/01/rdf-schema#label |
HIDS
|
gptkbp:implementedIn |
gptkb:software
industrial equipment |
gptkbp:monitors |
host computer
|
gptkbp:standsFor |
Host-based Intrusion Detection System
|
gptkbp:used_in |
cybersecurity
enterprise networks |
gptkbp:bfsParent |
gptkb:Bluetooth_Basic_Rate/Enhanced_Data_Rate
|
gptkbp:bfsLayer |
6
|