EIVUS

Intrusion Detection on Hosted Servers

HIDS, log analysis, and alerting for suspicious activity.

Back to blog

Host-based IDS (e.g. OSSEC, Wazuh) monitors file and process changes. Centralize logs and use SIEM or alerting for anomalies. Combine with network-level detection. Tier-III providers often offer managed detection options.

Host-based IDS (HIDS)

  • What it does: Monitors file integrity (changes to critical files), processes, and sometimes log patterns. Alerts on suspicious or unauthorized changes.
  • Tools: OSSEC, Wazuh, Tripwire, AIDE. Some are open source; deploy an agent on each server or use a central manager.
  • Tuning: Reduce false positives by excluding known volatile paths (e.g. caches, logs) and tuning rules. Maintain a baseline.

Log centralization and SIEM

  • Centralize: Send logs (auth, app, firewall, IDS) to a central system (ELK, Splunk, Loki, or managed SIEM). Enables correlation and search across servers.
  • Alerting: Define rules for anomalies (e.g. failed logins, privilege escalation, unexpected outbound). Escalate to the right team.
  • Retention: Keep logs long enough for investigation and compliance; balance storage cost.

Network-level detection

  • NIDS: Network IDS (e.g. Suricata, Zeek) inspects traffic for known attacks or anomalies. Often run at the perimeter or on a mirror port.
  • Combine: HIDS + NIDS + logs give a fuller picture. Tier-III or managed providers may offer managed detection and response (MDR).

Summary

Use HIDS (e.g. Wazuh) for file and process monitoring; centralize logs and add SIEM/alerting. Combine with NIDS where possible. Tune to reduce false positives; consider managed detection from the provider.

Clients who trust us