HIDS (Host-based IDS) monitors a single host for suspicious activity — log analysis, file integrity, system call monitoring.
HIPS actively blocks detected threats.
HIDS/HIPS complement NIDS/NIPS. HIDS sees encrypted traffic (because it's on the endpoint). NIDS sees network patterns. Modern EDR solutions incorporate HIDS/HIPS functionality with much richer detection.