Comprehensive Guide to Host Intrusion Detection: Shield Your Networks from Cyber Threats