Host-based IPS (HIPS) is software installed directly on individual devices such as servers or workstations.
It monitors all traffic originating from or destined for that specific host, including system logs, file integrity, user login activities, running processes, and application behavior.
HIPS can detect attacks that originate from within the network, such as insider threats or local exploits, and can determine whether an attack was successful by analyzing system call paths.
It is particularly useful for protecting critical assets and can operate independently of the underlying operating system, although its functionality may vary depending on the OS.
However, HIPS can introduce performance overhead on the host system and requires individual deployment and management on each device, which can be costly and complex in large environments. Can see traffic after decryption on the host
File system monitors:
Logfile analysis:
Connection analysis:
Kernel based detection:
Examples - Cisco Security Agent (CSA), OSSEC, Fail2Ban
Detects insider threats, zero-day exploits via behavior, full context of local activity to protect File integrity, registry changes, local exploits