• An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations...
    46 KB (5,506 words) - 15:27, 9 July 2025
  • system as well as the network packets on its network interfaces, similar to the way a network-based intrusion detection system (NIDS) operates. HIDS focuses...
    12 KB (1,500 words) - 18:31, 25 May 2025
  • Snort (software) (category Intrusion detection systems)
    Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder and...
    6 KB (437 words) - 03:28, 2 July 2025
  • A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
    2 KB (281 words) - 12:38, 12 July 2024
  • anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity...
    5 KB (554 words) - 16:44, 4 May 2025
  • (intrusion detection), and can automatically take countermeasures (intrusion prevention). The primary purpose of a WIPS is to prevent unauthorized network access...
    7 KB (862 words) - 13:55, 19 February 2025
  • Zeek (category Intrusion detection systems)
    as a network intrusion detection system (NIDS). The Zeek project releases the software under the BSD license. Zeek's purpose is to inspect network traffic...
    7 KB (645 words) - 11:09, 22 July 2024
  • enabling a third party to listen. Network taps are commonly used for network intrusion detection systems, VoIP recording, network probes, RMON probes, packet...
    19 KB (2,789 words) - 15:04, 4 November 2024
  • In computer security, the Linux Intrusion Detection System (LIDS) was a patch to the Linux kernel and associated administrative tools that enhanced the...
    2 KB (241 words) - 20:04, 8 March 2025
  • as a free network intrusion detection system. Tcptrace is used to analyze pcap-based network intercepts, which is a packeting capture network application...
    31 KB (3,860 words) - 09:07, 12 July 2025
  • Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
    12 KB (1,612 words) - 21:44, 9 August 2023
  • Sguil (category Computer network security)
    prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project nmap Host-based intrusion detection system comparison Squil downloads...
    4 KB (249 words) - 12:12, 29 April 2022
  • Extrusion detection or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful...
    1 KB (179 words) - 02:26, 20 March 2024
  • Thumbnail for Suricata (software)
    Suricata (software) (category Intrusion detection systems)
    Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security...
    3 KB (193 words) - 00:14, 9 April 2025
  • Thumbnail for Norbert Pohlmann
    Virtual Private Network, Intrusion Detection System, Personal Firewalls MITP-Verlag, Bonn 2003 ISBN 3-8266-0988-3. Virtual Private Network (VPN) MITP-Verlag...
    5 KB (476 words) - 21:19, 19 December 2024
  • such as firewalls, intrusion detection systems, antivirus software and spyware-detection software. Most security monitoring systems utilize a signature-based...
    9 KB (808 words) - 14:07, 21 November 2024
  • for Discovery Science Network intrusion detection system, a system that tries to detect malicious activity by monitoring network traffic Neuroleptic-induced...
    563 bytes (104 words) - 15:46, 4 May 2023
  • Thumbnail for Honeypot (computing)
    and honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and...
    28 KB (3,253 words) - 19:52, 19 June 2025
  • Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
    9 KB (440 words) - 18:02, 16 July 2025
  • Pcap (category Network analyzers)
    network tools, including protocol analyzers (packet sniffers), network monitors, network intrusion detection systems, traffic-generators and network-testers...
    18 KB (1,574 words) - 01:29, 14 June 2025
  • Thumbnail for Denial-of-service attack
    Punch card with all holes punched Mixed threat attack Network intrusion detection system – Network protection device or softwarePages displaying short descriptions...
    101 KB (11,288 words) - 16:07, 8 July 2025
  • for US$135 million. Recourse's products included ManHunt, a network intrusion detection system and security event manager, and ManTrap, a honeypot. "Symantec...
    1 KB (78 words) - 05:37, 6 July 2023
  • target network or system, without detection. Evasions are typically used to counter network-based intrusion detection and prevention systems (IPS, IDS)...
    4 KB (523 words) - 22:39, 29 April 2024
  • (Intrusion Detection Message Exchange Format) is a data format used to exchange information between software enabling intrusion detection, intrusion prevention...
    9 KB (1,085 words) - 00:33, 7 December 2024
  • Thumbnail for Computer security
    traffic of a computer network and establish a barrier between a trusted network and an untrusted network. Intrusion Detection System (IDS) products are designed...
    220 KB (22,295 words) - 11:20, 16 July 2025
  • malicious user (or software) may be able to evade the detection of a single intrusion detection system, it becomes exponentially more difficult to get around...
    8 KB (928 words) - 17:00, 13 December 2024
  • password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system. He is also a member of Cult of the Dead Cow and its Ninja...
    5 KB (393 words) - 19:49, 6 January 2025
  • cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting ecosystem...
    41 KB (4,426 words) - 05:41, 25 June 2025
  • Controller or Network Interface Card NIDS—Network intrusion detection systems NIM—No Internal Message NIO—Non-blocking I/O NIPS—Network-based intrusion prevention...
    107 KB (7,615 words) - 06:41, 17 July 2025
  • Samhain (software) (category Intrusion detection systems)
    integrity checker and host intrusion detection system that can be used on single hosts as well as large, UNIX-based networks. It supports central monitoring...
    2 KB (138 words) - 16:25, 6 July 2025