. . "\u0425\u043E\u0441\u0442\u043E\u0432\u0430\u044F \u0441\u0438\u0441\u0442\u0435\u043C\u0430 \u043E\u0431\u043D\u0430\u0440\u0443\u0436\u0435\u043D\u0438\u044F \u0432\u0442\u043E\u0440\u0436\u0435\u043D\u0438\u0439 (\u0430\u043D\u0433\u043B. Host-based intrusion detection system, HIDS) \u2014 \u044D\u0442\u043E \u0441\u0438\u0441\u0442\u0435\u043C\u0430 \u043E\u0431\u043D\u0430\u0440\u0443\u0436\u0435\u043D\u0438\u044F \u0432\u0442\u043E\u0440\u0436\u0435\u043D\u0438\u0439, \u043A\u043E\u0442\u043E\u0440\u0430\u044F \u0432\u0435\u0434\u0435\u0442 \u043D\u0430\u0431\u043B\u044E\u0434\u0435\u043D\u0438\u0435 \u0438 \u0430\u043D\u0430\u043B\u0438\u0437 \u0441\u043E\u0431\u044B\u0442\u0438\u0439, \u043F\u0440\u043E\u0438\u0441\u0445\u043E\u0434\u044F\u0449\u0438\u0445 \u0432\u043D\u0443\u0442\u0440\u0438 \u0441\u0438\u0441\u0442\u0435\u043C\u044B (\u0432 \u043E\u0442\u043B\u0438\u0447\u0438\u0435 \u043E\u0442 \u0441\u0435\u0442\u0435\u0432\u043E\u0439 \u0421\u041E\u0412, \u043A\u043E\u0442\u043E\u0440\u0430\u044F \u043E\u0442\u0441\u043B\u0435\u0436\u0438\u0432\u0430\u0435\u0442 \u0432 \u043F\u0435\u0440\u0432\u0443\u044E \u043E\u0447\u0435\u0440\u0435\u0434\u044C \u0441\u0435\u0442\u0435\u0432\u043E\u0439 \u0442\u0440\u0430\u0444\u0438\u043A)"@ru . . . "\uD638\uC2A4\uD2B8 \uAE30\uBC18 \uCE68\uC785 \uD0D0\uC9C0 \uC2DC\uC2A4\uD15C(Host-based Intrusion Detection System, HIDS)\uC740 \uCE68\uC785 \uD0D0\uC9C0 \uC2DC\uC2A4\uD15C\uC758 \uD2B9\uBCC4\uD55C \uC885\uB958\uB85C\uC11C, \uCEF4\uD4E8\uD130 \uC2DC\uC2A4\uD15C\uC758 \uB0B4\uBD80\uB97C \uAC10\uC2DC\uD558\uACE0 \uBD84\uC11D\uD558\uB294 \uB370 \uB354 \uC911\uC810\uC744 \uB454\uB2E4. \uB124\uD2B8\uC6CC\uD06C \uCE68\uC785 \uD0D0\uC9C0 \uC2DC\uC2A4\uD15C(NIDS)\uACFC \uAC19\uC740 \uC678\uBD80 \uC778\uD130\uD398\uC774\uC2A4\uC5D0 \uC911\uC810\uC744 \uB450\uB294 \uC2DC\uC2A4\uD15C\uACFC\uB294 \uAD6C\uBCC4\uB41C\uB2E4."@ko . . . . . . . "9821"^^ . . . . "HIDS, Sistema de detecci\u00F3 d'intrusos en un Host. Cerca detectar anomalies que indiquen un risc potencial, revisant les activitats en la m\u00E0quina (host). Pot prendre mesures protectores. \u00C9s un tipus de Sistema de detecci\u00F3 d'intrusos. Les funcions d'aquest tipus de programari s\u00F3n molt similars a les dels IDS. Configuracions t\u00EDpiques permeten diversos HIDS repartits per la xarxa que envien els seus resultats a un servidor centralitzat que els analitzar\u00E0 a la recerca dels riscos i alertes abans esmentats."@ca . . . . "\uD638\uC2A4\uD2B8 \uAE30\uBC18 \uCE68\uC785 \uD0D0\uC9C0 \uC2DC\uC2A4\uD15C(Host-based Intrusion Detection System, HIDS)\uC740 \uCE68\uC785 \uD0D0\uC9C0 \uC2DC\uC2A4\uD15C\uC758 \uD2B9\uBCC4\uD55C \uC885\uB958\uB85C\uC11C, \uCEF4\uD4E8\uD130 \uC2DC\uC2A4\uD15C\uC758 \uB0B4\uBD80\uB97C \uAC10\uC2DC\uD558\uACE0 \uBD84\uC11D\uD558\uB294 \uB370 \uB354 \uC911\uC810\uC744 \uB454\uB2E4. \uB124\uD2B8\uC6CC\uD06C \uCE68\uC785 \uD0D0\uC9C0 \uC2DC\uC2A4\uD15C(NIDS)\uACFC \uAC19\uC740 \uC678\uBD80 \uC778\uD130\uD398\uC774\uC2A4\uC5D0 \uC911\uC810\uC744 \uB450\uB294 \uC2DC\uC2A4\uD15C\uACFC\uB294 \uAD6C\uBCC4\uB41C\uB2E4."@ko . "Host-based intrusion detection system"@es . . . "\u4E3B\u6A5F\u5165\u4FB5\u6AA2\u6E2C\u7CFB\u7D71"@zh . . . . . "Un Host based intrusion detection system (HIDS) \u00E8 una tipologia di intrusion detection system specializzato nell'analisi e nel monitoraggio del computer. Una variante del network intrusion detection system, uno strumento indirizzato verso l'analisi del traffico di rete."@it . . "\u0425\u043E\u0441\u0442\u043E\u0432\u0430\u044F \u0441\u0438\u0441\u0442\u0435\u043C\u0430 \u043E\u0431\u043D\u0430\u0440\u0443\u0436\u0435\u043D\u0438\u044F \u0432\u0442\u043E\u0440\u0436\u0435\u043D\u0438\u0439 (\u0430\u043D\u0433\u043B. Host-based intrusion detection system, HIDS) \u2014 \u044D\u0442\u043E \u0441\u0438\u0441\u0442\u0435\u043C\u0430 \u043E\u0431\u043D\u0430\u0440\u0443\u0436\u0435\u043D\u0438\u044F \u0432\u0442\u043E\u0440\u0436\u0435\u043D\u0438\u0439, \u043A\u043E\u0442\u043E\u0440\u0430\u044F \u0432\u0435\u0434\u0435\u0442 \u043D\u0430\u0431\u043B\u044E\u0434\u0435\u043D\u0438\u0435 \u0438 \u0430\u043D\u0430\u043B\u0438\u0437 \u0441\u043E\u0431\u044B\u0442\u0438\u0439, \u043F\u0440\u043E\u0438\u0441\u0445\u043E\u0434\u044F\u0449\u0438\u0445 \u0432\u043D\u0443\u0442\u0440\u0438 \u0441\u0438\u0441\u0442\u0435\u043C\u044B (\u0432 \u043E\u0442\u043B\u0438\u0447\u0438\u0435 \u043E\u0442 \u0441\u0435\u0442\u0435\u0432\u043E\u0439 \u0421\u041E\u0412, \u043A\u043E\u0442\u043E\u0440\u0430\u044F \u043E\u0442\u0441\u043B\u0435\u0436\u0438\u0432\u0430\u0435\u0442 \u0432 \u043F\u0435\u0440\u0432\u0443\u044E \u043E\u0447\u0435\u0440\u0435\u0434\u044C \u0441\u0435\u0442\u0435\u0432\u043E\u0439 \u0442\u0440\u0430\u0444\u0438\u043A)"@ru . . "\u4E3B\u673A\u5165\u4FB5\u68C0\u6D4B\u7CFB\u7D71\uFF08Host-based intrusion detection system\uFF0CHIDS\uFF09\u53C8\u7A31\u57FA\u4E8E\u4E3B\u673A\u7684\u5165\u4FB5\u68C0\u6D4B\u7CFB\u7EDF\uFF0C\u51FA\u73FE\u65BC20\u4E16\u7D0080\u5E74\u4EE3\u65E9\u671F\uFF0C\u662F\u4E00\u79CD\u5B89\u88DD\u65BC\u8A08\u7B97\u6A5F\u4E0A\u76D1\u6D4B\u548C\u5206\u6790\u8BA1\u7B97\u6A5F\u7CFB\u7EDF\u5185\u90E8\u4EE5\u53CA\u5176\u7F51\u7EDC\u63A5\u53E3\u4E0A\u7684\u7DB2\u8DEF\u5C01\u5305\u7684\u5165\u4FB5\u68C0\u6D4B\u7CFB\u7EDF\u3002\u4E3B\u673A\u5165\u4FB5\u68C0\u6D4B\u7CFB\u7D71\u65E9\u671F\u61C9\u7528\u65BC\u8207\u5916\u754C\u4EA4\u4E92\u4E0D\u9891\u7E41\u7684\u5927\u578B\u8BA1\u7B97\u673A\u3002"@zh . . "Host-based intrusion detection system"@it . . . . . . . "1189224"^^ . . "1085246333"^^ . . "A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces, similar to the way a network-based intrusion detection system (NIDS) operates. This was the first type of intrusion detection software to have been designed, with the original target system being the mainframe computer where outside interaction was infrequent."@en . "Host-based intrusion detection system"@en . . . . . . . "HIDS, Sistema de detecci\u00F3 d'intrusos en un Host. Cerca detectar anomalies que indiquen un risc potencial, revisant les activitats en la m\u00E0quina (host). Pot prendre mesures protectores. \u00C9s un tipus de Sistema de detecci\u00F3 d'intrusos. Les funcions d'aquest tipus de programari s\u00F3n molt similars a les dels IDS. Configuracions t\u00EDpiques permeten diversos HIDS repartits per la xarxa que envien els seus resultats a un servidor centralitzat que els analitzar\u00E0 a la recerca dels riscos i alertes abans esmentats. Est va ser el primer tipus de programari de detecci\u00F3 d'intrusos que es va dissenyar, sent l'objectiu original el Mainframe, on la interacci\u00F3 exterior era infreq\u00FCent."@ca . . . . . . . "\u4E3B\u673A\u5165\u4FB5\u68C0\u6D4B\u7CFB\u7D71\uFF08Host-based intrusion detection system\uFF0CHIDS\uFF09\u53C8\u7A31\u57FA\u4E8E\u4E3B\u673A\u7684\u5165\u4FB5\u68C0\u6D4B\u7CFB\u7EDF\uFF0C\u51FA\u73FE\u65BC20\u4E16\u7D0080\u5E74\u4EE3\u65E9\u671F\uFF0C\u662F\u4E00\u79CD\u5B89\u88DD\u65BC\u8A08\u7B97\u6A5F\u4E0A\u76D1\u6D4B\u548C\u5206\u6790\u8BA1\u7B97\u6A5F\u7CFB\u7EDF\u5185\u90E8\u4EE5\u53CA\u5176\u7F51\u7EDC\u63A5\u53E3\u4E0A\u7684\u7DB2\u8DEF\u5C01\u5305\u7684\u5165\u4FB5\u68C0\u6D4B\u7CFB\u7EDF\u3002\u4E3B\u673A\u5165\u4FB5\u68C0\u6D4B\u7CFB\u7D71\u65E9\u671F\u61C9\u7528\u65BC\u8207\u5916\u754C\u4EA4\u4E92\u4E0D\u9891\u7E41\u7684\u5927\u578B\u8BA1\u7B97\u673A\u3002"@zh . "A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces, similar to the way a network-based intrusion detection system (NIDS) operates. This was the first type of intrusion detection software to have been designed, with the original target system being the mainframe computer where outside interaction was infrequent."@en . "HIDS"@ca . "HIDS es tambi\u00E9n conocido como Sistema de detecci\u00F3n de intrusos en un Host. Busca detectar anomal\u00EDas que indican un riesgo potencial, revisando las actividades en la m\u00E1quina (host). Puede tomar medidas protectoras. Las funciones de este tipo de software son muy similares a las de los IDS. Configuraciones t\u00EDpicas permiten varios HIDS repartidos por la red que env\u00EDan sus resultados a un servidor centralizado que los analizar\u00E1 en busca de los riesgos y alertas antes mencionados. Este fue el primer tipo de software de detecci\u00F3n de intrusos que se dise\u00F1\u00F3, siendo el objetivo original el Mainframe, donde la interacci\u00F3n exterior era infrecuente.\u200B"@es . "\u0425\u043E\u0441\u0442\u043E\u0432\u0430\u044F \u0441\u0438\u0441\u0442\u0435\u043C\u0430 \u043E\u0431\u043D\u0430\u0440\u0443\u0436\u0435\u043D\u0438\u044F \u0432\u0442\u043E\u0440\u0436\u0435\u043D\u0438\u0439"@ru . "\uD638\uC2A4\uD2B8 \uAE30\uBC18 \uCE68\uC785 \uD0D0\uC9C0 \uC2DC\uC2A4\uD15C"@ko . . . . . . . . . . . . . . . . . . "HIDS es tambi\u00E9n conocido como Sistema de detecci\u00F3n de intrusos en un Host. Busca detectar anomal\u00EDas que indican un riesgo potencial, revisando las actividades en la m\u00E1quina (host). Puede tomar medidas protectoras. Las funciones de este tipo de software son muy similares a las de los IDS. Configuraciones t\u00EDpicas permiten varios HIDS repartidos por la red que env\u00EDan sus resultados a un servidor centralizado que los analizar\u00E1 en busca de los riesgos y alertas antes mencionados."@es . . . . . . . . . "Un Host based intrusion detection system (HIDS) \u00E8 una tipologia di intrusion detection system specializzato nell'analisi e nel monitoraggio del computer. Una variante del network intrusion detection system, uno strumento indirizzato verso l'analisi del traffico di rete."@it . .