• An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations...
    46 KB (5,513 words) - 03:39, 6 June 2025
  • host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as...
    12 KB (1,500 words) - 18:31, 25 May 2025
  • Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
    12 KB (1,612 words) - 21:44, 9 August 2023
  • anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity...
    5 KB (554 words) - 16:44, 4 May 2025
  • Thumbnail for Suricata (software)
    Suricata (software) (category Intrusion detection systems)
    Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security...
    3 KB (193 words) - 00:14, 9 April 2025
  • Thumbnail for Perimeter intrusion detection
    A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter...
    4 KB (310 words) - 07:05, 29 November 2023
  • Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
    9 KB (425 words) - 10:55, 19 May 2025
  • automate wireless scanning for large organizations. A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized...
    7 KB (862 words) - 13:55, 19 February 2025
  • Snort (software) (category Intrusion detection systems)
    Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder and...
    6 KB (437 words) - 06:12, 23 April 2025
  • An application protocol-based intrusion detection system (APIDS) is an intrusion detection system that focuses its monitoring and analysis on a specific...
    2 KB (239 words) - 18:42, 22 October 2024
  • The Advanced Intrusion Detection Environment (AIDE) was initially developed as a free replacement for Tripwire licensed under the terms of the GNU General...
    4 KB (297 words) - 06:42, 22 September 2023
  • Free Software portal Sagan Intrusion detection system (IDS) Intrusion prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project...
    4 KB (249 words) - 12:12, 29 April 2022
  • (Intrusion Detection Message Exchange Format) is a data format used to exchange information between software enabling intrusion detection, intrusion prevention...
    9 KB (1,085 words) - 00:33, 7 December 2024
  • The EINSTEIN System (part of the National Cybersecurity Protection System) is a network intrusion detection and prevention system that monitors the networks...
    26 KB (2,489 words) - 03:42, 24 April 2025
  • A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
    2 KB (281 words) - 12:38, 12 July 2024
  • Thumbnail for Dorothy E. Denning
    Dorothy E. Denning (category Computer systems researchers)
    security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four...
    20 KB (2,203 words) - 15:23, 19 June 2025
  • Thumbnail for Security alarm
    A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security...
    56 KB (7,857 words) - 22:05, 10 May 2025
  • OSSEC (category Intrusion detection systems)
    host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based...
    4 KB (433 words) - 15:11, 15 March 2025
  • Thumbnail for Sourcefire
    network security appliances were based on Snort, an open-source intrusion detection system (IDS). Sourcefire was acquired by Cisco for $2.7 billion in July...
    16 KB (1,425 words) - 22:53, 28 March 2025
  • applications in cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting...
    41 KB (4,426 words) - 22:14, 11 June 2025
  • Thumbnail for Honeypot (computing)
    honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and analysis...
    28 KB (3,253 words) - 19:52, 19 June 2025
  • Thumbnail for Kismet (software)
    Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports...
    5 KB (568 words) - 11:34, 5 June 2025
  • In computer security, the Linux Intrusion Detection System (LIDS) was a patch to the Linux kernel and associated administrative tools that enhanced the...
    2 KB (241 words) - 20:04, 8 March 2025
  • Ensemble learning systems have shown a proper efficacy in this area. An intrusion detection system monitors computer network or computer systems to identify...
    53 KB (6,685 words) - 14:14, 8 June 2025
  • the access of outsiders to the internal network and an intrusion detection system detects intrusion attempts by outsiders. Inside attacks can be averted...
    13 KB (1,443 words) - 18:44, 27 December 2024
  • Open Source Tripwire (category Intrusion detection systems)
    methods.: 15  Free and open-source software portal AIDE Host-based intrusion detection system comparison OSSEC Samhain "LICENSE". Github. Retrieved 5 September...
    16 KB (1,724 words) - 12:48, 30 April 2025
  • also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals. Such threat actors' motivations are typically political...
    52 KB (4,072 words) - 07:05, 29 May 2025
  • Thumbnail for IP address spoofing
    from launching IP spoofing attacks against external machines. An intrusion detection system (IDS) is a common use of packet filtering, which has been used...
    9 KB (1,163 words) - 14:09, 14 June 2025
  • HIDS may refer to: Host-based intrusion detection system, in computing Hyper-IgD syndrome, in medicine HID (disambiguation) This disambiguation page lists...
    383 bytes (49 words) - 16:30, 9 July 2018
  • Thumbnail for Physical security
    Physical security (category Warning systems)
    interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent...
    24 KB (2,265 words) - 11:30, 17 June 2025