What are the characteristics of Host based IDS?
(a) The host operating system logs in the audit information
(b) Logs includes logins,file opens and program executions
(c) Logs are analysed to detect tails of intrusion
(d) All of the mentioned
The question was posed to me in an internship interview.
This question is from Security in chapter Security of Operating System