• An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations...
    46 KB (5,506 words) - 15:27, 9 July 2025
  • system as well as the network packets on its network interfaces, similar to the way a network-based intrusion detection system (NIDS) operates. HIDS focuses...
    12 KB (1,500 words) - 18:31, 25 May 2025
  • Snort (software) (category Intrusion detection systems)
    Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder and...
    6 KB (437 words) - 03:28, 2 July 2025
  • A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
    2 KB (281 words) - 12:38, 12 July 2024
  • anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity...
    5 KB (554 words) - 16:44, 4 May 2025
  • (intrusion detection), and can automatically take countermeasures (intrusion prevention). The primary purpose of a WIPS is to prevent unauthorized network access...
    7 KB (862 words) - 13:55, 19 February 2025
  • Zeek (category Intrusion detection systems)
    as a network intrusion detection system (NIDS). The Zeek project releases the software under the BSD license. Zeek's purpose is to inspect network traffic...
    7 KB (645 words) - 11:09, 22 July 2024
  • enabling a third party to listen. Network taps are commonly used for network intrusion detection systems, VoIP recording, network probes, RMON probes, packet...
    19 KB (2,788 words) - 07:03, 23 July 2025
  • Thumbnail for Honeypot (computing)
    and honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and...
    28 KB (3,253 words) - 19:52, 19 June 2025
  • Sguil (category Computer network security)
    prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project nmap Host-based intrusion detection system comparison Squil downloads...
    4 KB (249 words) - 12:12, 29 April 2022
  • In computer security, the Linux Intrusion Detection System (LIDS) was a patch to the Linux kernel and associated administrative tools that enhanced the...
    2 KB (241 words) - 20:04, 8 March 2025
  • Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
    9 KB (440 words) - 18:02, 16 July 2025
  • for Discovery Science Network intrusion detection system, a system that tries to detect malicious activity by monitoring network traffic Neuroleptic-induced...
    563 bytes (104 words) - 15:46, 4 May 2023
  • as a free network intrusion detection system. Tcptrace is used to analyze pcap-based network intercepts, which is a packeting capture network application...
    31 KB (3,860 words) - 09:07, 12 July 2025
  • Extrusion detection or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful...
    1 KB (179 words) - 02:26, 20 March 2024
  • Thumbnail for Suricata (software)
    Suricata (software) (category Intrusion detection systems)
    Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security...
    3 KB (193 words) - 00:14, 9 April 2025
  • Thumbnail for Denial-of-service attack
    Punch card with all holes punched Mixed threat attack Network intrusion detection system – Network protection device or softwarePages displaying short descriptions...
    101 KB (11,288 words) - 16:07, 8 July 2025
  • Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
    12 KB (1,612 words) - 21:44, 9 August 2023
  • Thumbnail for Norbert Pohlmann
    Virtual Private Network, Intrusion Detection System, Personal Firewalls MITP-Verlag, Bonn 2003 ISBN 3-8266-0988-3. Virtual Private Network (VPN) MITP-Verlag...
    5 KB (476 words) - 21:19, 19 December 2024
  • Pcap (category Network analyzers)
    network tools, including protocol analyzers (packet sniffers), network monitors, network intrusion detection systems, traffic-generators and network-testers...
    18 KB (1,574 words) - 01:29, 14 June 2025
  • target network or system, without detection. Evasions are typically used to counter network-based intrusion detection and prevention systems (IPS, IDS)...
    4 KB (523 words) - 22:39, 29 April 2024
  • for US$135 million. Recourse's products included ManHunt, a network intrusion detection system and security event manager, and ManTrap, a honeypot. "Symantec...
    1 KB (78 words) - 05:37, 6 July 2023
  • such as firewalls, intrusion detection systems, antivirus software and spyware-detection software. Most security monitoring systems utilize a signature-based...
    9 KB (808 words) - 14:07, 21 November 2024
  • Thumbnail for Computer security
    traffic of a computer network and establish a barrier between a trusted network and an untrusted network. Intrusion Detection System (IDS) products are designed...
    220 KB (22,295 words) - 11:20, 16 July 2025
  • password auditing tool @stake LC (L0phtCrack) and the AntiSniff network intrusion detection system. He is also a member of Cult of the Dead Cow and its Ninja...
    5 KB (394 words) - 02:32, 23 July 2025
  • cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting ecosystem...
    41 KB (4,426 words) - 05:41, 25 June 2025
  • Controller or Network Interface Card NIDS—Network intrusion detection systems NIM—No Internal Message NIO—Non-blocking I/O NIPS—Network-based intrusion prevention...
    112 KB (7,977 words) - 19:47, 23 July 2025
  • (software) – Network intrusion detection system sqlmap – Automated SQL injection and database takeover tool Suricata (software) – Network threat detection engine...
    79 KB (5,815 words) - 22:55, 23 July 2025
  • OSSEC (category Intrusion detection systems)
    host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based...
    4 KB (433 words) - 15:11, 15 March 2025
  • Thumbnail for Air gap (networking)
    attack, intrusion, or other malicious acts by third party adversaries. "Weber vs SEC". 30 April 2021. Industrial internal network computer systems are so...
    20 KB (2,304 words) - 20:21, 23 July 2025