An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations...
46 KB (5,506 words) - 15:27, 9 July 2025
system as well as the network packets on its network interfaces, similar to the way a network-based intrusion detection system (NIDS) operates. HIDS focuses...
12 KB (1,500 words) - 18:31, 25 May 2025
Snort (software) (category Intrusion detection systems)
Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder and...
6 KB (437 words) - 03:28, 2 July 2025
A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
2 KB (281 words) - 12:38, 12 July 2024
anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity...
5 KB (554 words) - 16:44, 4 May 2025
(intrusion detection), and can automatically take countermeasures (intrusion prevention). The primary purpose of a WIPS is to prevent unauthorized network access...
7 KB (862 words) - 13:55, 19 February 2025
Zeek (category Intrusion detection systems)
as a network intrusion detection system (NIDS). The Zeek project releases the software under the BSD license. Zeek's purpose is to inspect network traffic...
7 KB (645 words) - 11:09, 22 July 2024
enabling a third party to listen. Network taps are commonly used for network intrusion detection systems, VoIP recording, network probes, RMON probes, packet...
19 KB (2,789 words) - 15:04, 4 November 2024
In computer security, the Linux Intrusion Detection System (LIDS) was a patch to the Linux kernel and associated administrative tools that enhanced the...
2 KB (241 words) - 20:04, 8 March 2025
as a free network intrusion detection system. Tcptrace is used to analyze pcap-based network intercepts, which is a packeting capture network application...
31 KB (3,860 words) - 09:07, 12 July 2025
Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
12 KB (1,612 words) - 21:44, 9 August 2023
Sguil (category Computer network security)
prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project nmap Host-based intrusion detection system comparison Squil downloads...
4 KB (249 words) - 12:12, 29 April 2022
Extrusion detection or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful...
1 KB (179 words) - 02:26, 20 March 2024
Suricata (software) (category Intrusion detection systems)
Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security...
3 KB (193 words) - 00:14, 9 April 2025
Virtual Private Network, Intrusion Detection System, Personal Firewalls MITP-Verlag, Bonn 2003 ISBN 3-8266-0988-3. Virtual Private Network (VPN) MITP-Verlag...
5 KB (476 words) - 21:19, 19 December 2024
such as firewalls, intrusion detection systems, antivirus software and spyware-detection software. Most security monitoring systems utilize a signature-based...
9 KB (808 words) - 14:07, 21 November 2024
for Discovery Science Network intrusion detection system, a system that tries to detect malicious activity by monitoring network traffic Neuroleptic-induced...
563 bytes (104 words) - 15:46, 4 May 2023
Honeypot (computing) (redirect from Military intrusion detection honeypots)
and honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and...
28 KB (3,253 words) - 19:52, 19 June 2025
Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
9 KB (440 words) - 18:02, 16 July 2025
Pcap (category Network analyzers)
network tools, including protocol analyzers (packet sniffers), network monitors, network intrusion detection systems, traffic-generators and network-testers...
18 KB (1,574 words) - 01:29, 14 June 2025
Denial-of-service attack (redirect from DDoS detection)
Punch card with all holes punched Mixed threat attack Network intrusion detection system – Network protection device or softwarePages displaying short descriptions...
101 KB (11,288 words) - 16:07, 8 July 2025
for US$135 million. Recourse's products included ManHunt, a network intrusion detection system and security event manager, and ManTrap, a honeypot. "Symantec...
1 KB (78 words) - 05:37, 6 July 2023
target network or system, without detection. Evasions are typically used to counter network-based intrusion detection and prevention systems (IPS, IDS)...
4 KB (523 words) - 22:39, 29 April 2024
(Intrusion Detection Message Exchange Format) is a data format used to exchange information between software enabling intrusion detection, intrusion prevention...
9 KB (1,085 words) - 00:33, 7 December 2024
Computer security (redirect from System security)
traffic of a computer network and establish a barrier between a trusted network and an untrusted network. Intrusion Detection System (IDS) products are designed...
220 KB (22,295 words) - 11:20, 16 July 2025
Prelude SIEM (redirect from Prelude SIEM (Intrusion Detection System))
malicious user (or software) may be able to evade the detection of a single intrusion detection system, it becomes exponentially more difficult to get around...
8 KB (928 words) - 17:00, 13 December 2024
password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system. He is also a member of Cult of the Dead Cow and its Ninja...
5 KB (393 words) - 19:49, 6 January 2025
cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting ecosystem...
41 KB (4,426 words) - 05:41, 25 June 2025
Controller or Network Interface Card NIDS—Network intrusion detection systems NIM—No Internal Message NIO—Non-blocking I/O NIPS—Network-based intrusion prevention...
107 KB (7,615 words) - 06:41, 17 July 2025
Samhain (software) (category Intrusion detection systems)
integrity checker and host intrusion detection system that can be used on single hosts as well as large, UNIX-based networks. It supports central monitoring...
2 KB (138 words) - 16:25, 6 July 2025