• An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for...
    46 KB (5,578 words) - 13:59, 15 May 2024
  • host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as...
    12 KB (1,500 words) - 18:18, 27 March 2024
  • anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity...
    5 KB (557 words) - 02:18, 1 February 2024
  • automate wireless scanning for large organizations. A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized...
    7 KB (858 words) - 21:59, 12 March 2023
  • Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
    12 KB (1,612 words) - 21:44, 9 August 2023
  • The EINSTEIN System (part of the National Cybersecurity Protection System) is a network intrusion detection and prevention system that monitors the networks...
    23 KB (2,344 words) - 07:09, 15 May 2024
  • Thumbnail for Perimeter intrusion detection
    A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter...
    4 KB (310 words) - 07:05, 29 November 2023
  • Snort (software) (category Intrusion detection systems)
    Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder and...
    6 KB (442 words) - 06:49, 12 April 2024
  • Thumbnail for Suricata (software)
    Suricata (software) (category Intrusion detection systems)
    Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security...
    3 KB (107 words) - 18:56, 17 January 2024
  • A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
    2 KB (263 words) - 13:57, 18 May 2022
  • Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
    8 KB (396 words) - 16:07, 20 March 2024
  • malicious user (or software) may be able to evade the detection of a single intrusion detection system, it becomes exponentially more difficult to get around...
    8 KB (928 words) - 22:06, 11 March 2024
  • An application protocol-based intrusion detection system (APIDS) is an intrusion detection system that focuses its monitoring and analysis on a specific...
    2 KB (206 words) - 19:11, 2 April 2024
  • The Advanced Intrusion Detection Environment (AIDE) was initially developed as a free replacement for Tripwire licensed under the terms of the GNU General...
    4 KB (298 words) - 06:42, 22 September 2023
  • In computer security, the Linux Intrusion Detection System (LIDS) was a patch to the Linux kernel and associated administrative tools that enhanced the...
    2 KB (241 words) - 17:24, 30 January 2024
  • OSSEC (category Intrusion detection systems)
    host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based...
    5 KB (493 words) - 17:22, 17 February 2023
  • applications in cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting...
    38 KB (4,013 words) - 13:28, 25 April 2024
  • (Intrusion Detection Message Exchange Format) is a data format used to exchange information between software enabling intrusion detection, intrusion prevention...
    9 KB (1,085 words) - 06:40, 4 February 2023
  • Thumbnail for Sourcefire
    Sourcefire (category Cisco Systems acquisitions)
    network security appliances were based on Snort, an open-source intrusion detection system (IDS). Sourcefire was acquired by Cisco for $2.7 billion in July...
    19 KB (1,599 words) - 20:02, 26 April 2024
  • Thumbnail for Security alarm
    A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security...
    56 KB (7,842 words) - 22:05, 11 May 2024
  • Thumbnail for Honeypot (computing)
    honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and analysis...
    28 KB (3,201 words) - 17:44, 4 April 2024
  • Thumbnail for Kismet (software)
    Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports...
    6 KB (584 words) - 20:45, 3 April 2024
  • Free Software portal Sagan Intrusion detection system (IDS) Intrusion prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project...
    4 KB (249 words) - 12:12, 29 April 2022
  • Ensemble learning systems have shown a proper efficacy in this area. An intrusion detection system monitors computer network or computer systems to identify...
    52 KB (6,612 words) - 05:53, 13 May 2024
  • tunnelling them in (D)TLS, allow inspection of encrypted traffic by an intrusion detection system to detect and block malicious activities, allow network surveillance...
    6 KB (705 words) - 14:43, 16 March 2024
  • Thumbnail for Physical security
    Physical security (category Warning systems)
    interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent...
    24 KB (2,319 words) - 01:46, 10 May 2024
  • sharing on its systems. In addition to software, people, devices, and websites can also be whitelisted or blacklisted. Intrusion detection systems are designed...
    5 KB (576 words) - 00:13, 26 December 2023
  • it as an intrusion-detection system (IDS), as it proactively works to find suspicious activity within a computer network, alerting the system administrator...
    4 KB (469 words) - 18:47, 21 December 2023
  • Information and Decision Systems, an interdisciplinary research laboratory of MIT, Cambridge, Massachusetts Linux Intrusion Detection System, a patch to the Linux...
    891 bytes (122 words) - 17:12, 22 March 2024
  • HIDS may refer to: Host-based intrusion detection system, in computing Hyper-IgD syndrome, in medicine HID (disambiguation) This disambiguation page lists...
    383 bytes (49 words) - 16:30, 9 July 2018