An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations...
46 KB (5,513 words) - 11:55, 24 April 2025
host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as...
12 KB (1,500 words) - 18:18, 27 March 2024
anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity...
5 KB (554 words) - 16:44, 4 May 2025
Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
12 KB (1,612 words) - 21:44, 9 August 2023
A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter...
4 KB (310 words) - 07:05, 29 November 2023
A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
2 KB (281 words) - 12:38, 12 July 2024
An application protocol-based intrusion detection system (APIDS) is an intrusion detection system that focuses its monitoring and analysis on a specific...
2 KB (239 words) - 18:42, 22 October 2024
Suricata (software) (category Intrusion detection systems)
Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security...
3 KB (193 words) - 00:14, 9 April 2025
In computer security, the Linux Intrusion Detection System (LIDS) was a patch to the Linux kernel and associated administrative tools that enhanced the...
2 KB (241 words) - 20:04, 8 March 2025
Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
9 KB (425 words) - 23:23, 11 August 2024
(Intrusion Detection Message Exchange Format) is a data format used to exchange information between software enabling intrusion detection, intrusion prevention...
9 KB (1,085 words) - 00:33, 7 December 2024
Snort (software) (category Intrusion detection systems)
Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder and...
6 KB (437 words) - 06:12, 23 April 2025
automate wireless scanning for large organizations. A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized...
7 KB (862 words) - 13:55, 19 February 2025
The Advanced Intrusion Detection Environment (AIDE) was initially developed as a free replacement for Tripwire licensed under the terms of the GNU General...
4 KB (297 words) - 06:42, 22 September 2023
Free Software portal Sagan Intrusion detection system (IDS) Intrusion prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project...
4 KB (249 words) - 12:12, 29 April 2022
Einstein (US-CERT program) (redirect from Einstein intrusion detection system)
The EINSTEIN System (part of the National Cybersecurity Protection System) is a network intrusion detection and prevention system that monitors the networks...
26 KB (2,489 words) - 03:42, 24 April 2025
network security appliances were based on Snort, an open-source intrusion detection system (IDS). Sourcefire was acquired by Cisco for $2.7 billion in July...
16 KB (1,425 words) - 22:53, 28 March 2025
OSSEC (category Intrusion detection systems)
host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based...
4 KB (433 words) - 15:11, 15 March 2025
applications in cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting...
40 KB (4,356 words) - 00:03, 5 May 2025
Security alarm (redirect from Intrusion Alarm)
A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security...
56 KB (7,859 words) - 03:08, 21 April 2025
such as firewalls, intrusion detection systems, antivirus software and spyware-detection software. Most security monitoring systems utilize a signature-based...
9 KB (808 words) - 14:07, 21 November 2024
Dorothy E. Denning (category Computer systems researchers)
security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four...
20 KB (2,203 words) - 00:43, 18 March 2025
target network or system, without detection. Evasions are typically used to counter network-based intrusion detection and prevention systems (IPS, IDS) but...
4 KB (523 words) - 22:39, 29 April 2024
Ensemble learning (section Intrusion detection)
Ensemble learning systems have shown a proper efficacy in this area. An intrusion detection system monitors computer network or computer systems to identify...
54 KB (6,794 words) - 06:02, 19 April 2025
HIDS may refer to: Host-based intrusion detection system, in computing Hyper-IgD syndrome, in medicine HID (disambiguation) This disambiguation page lists...
383 bytes (49 words) - 16:30, 9 July 2018
Information and Decision Systems, an interdisciplinary research laboratory of MIT, Cambridge, Massachusetts Linux Intrusion Detection System, a patch to the Linux...
747 bytes (105 words) - 00:21, 27 June 2024
and manufactures perimeter intrusion detection systems, video management software, security lighting, personal duress systems, and access control software...
13 KB (1,106 words) - 21:38, 26 April 2025
Prelude SIEM (redirect from Prelude SIEM (Intrusion Detection System))
malicious user (or software) may be able to evade the detection of a single intrusion detection system, it becomes exponentially more difficult to get around...
8 KB (928 words) - 17:00, 13 December 2024
network monitors, network intrusion detection systems, traffic-generators and network-testers. Most current Unix-like systems provide a mechanism by which...
18 KB (1,574 words) - 07:13, 29 November 2024
Zeek (category Intrusion detection systems)
network security monitor (NSM) but can also be used as a network intrusion detection system (NIDS). The Zeek project releases the software under the BSD license...
7 KB (645 words) - 11:09, 22 July 2024