Due to a growing number of Host's intrusions and since the Internet have become so ubiquitous, implementing various systems that monitor system security breaches, are inevitable. In this way, Host Intrusion Detection Systems (abbreviated as HIDS) have recently gained a noticeable amount of interest. These defensive systems detect malicious activities on host based applications. This paper reviews types of architecture in intrusion detection systems and describes a threat-aware HIDS architecture model. The proposed model provides an in-depth discussion of the HIDS architecture and its components.