Discussion and qualitative analysis on mitigation issues of cyber security from the host’s perspective are provided in this paper. The contribution seems to add some knowledge within the wider principles of host protection. The discussion in the paper is limited to two methods/proposed mitigation strategies, without justification of why the two mitigation strategies are selected or their significance. Otherwise, it is a good paper that is well written and makes an adequate contribution to the knowledge base.
Readers should consider other related works or materials as well [1,2,3]. These would provide more in-depth coverage of the problem domain within the paper and provide a better justification of its relevancy and contribution.
Overall, the paper is a worthy starting point to gain insight into host-level cyber defense mechanisms.