Scalable Processing Methods for Host-Based Intrusion Detection Systems