An intrusion detection system (IDS) gathers and analyzes information from within a computer or a
network to identify any possible violations of security policy, including unauthorized access, as
well as misuse. Which of the following intrusion detection systems audit events that occur on a
specific host?
A.
Network-based intrusion detection
B.
Host-based intrusion detection
C.
Log file monitoring
D.
File integrity checking