• An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations...
    46 KB (5,525 words) - 20:41, 21 October 2024
  • host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as...
    12 KB (1,500 words) - 18:18, 27 March 2024
  • anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity...
    5 KB (554 words) - 22:21, 24 September 2024
  • automate wireless scanning for large organizations. A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized...
    7 KB (858 words) - 21:59, 12 March 2023
  • Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
    9 KB (425 words) - 23:23, 11 August 2024
  • A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
    2 KB (281 words) - 12:38, 12 July 2024
  • Thumbnail for Suricata (software)
    Suricata (software) (category Intrusion detection systems)
    Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security...
    3 KB (107 words) - 18:56, 17 January 2024
  • Snort (software) (category Intrusion detection systems)
    Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder and...
    6 KB (441 words) - 12:10, 5 July 2024
  • malicious user (or software) may be able to evade the detection of a single intrusion detection system, it becomes exponentially more difficult to get around...
    8 KB (928 words) - 22:06, 11 March 2024
  • The Advanced Intrusion Detection Environment (AIDE) was initially developed as a free replacement for Tripwire licensed under the terms of the GNU General...
    4 KB (298 words) - 06:42, 22 September 2023
  • Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost...
    12 KB (1,612 words) - 21:44, 9 August 2023
  • In computer security, the Linux Intrusion Detection System (LIDS) was a patch to the Linux kernel and associated administrative tools that enhanced the...
    2 KB (241 words) - 17:24, 30 January 2024
  • OSSEC (category Intrusion detection systems)
    host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based...
    4 KB (433 words) - 16:52, 19 November 2024
  • Thumbnail for Perimeter intrusion detection
    A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter...
    4 KB (310 words) - 07:05, 29 November 2023
  • An application protocol-based intrusion detection system (APIDS) is an intrusion detection system that focuses its monitoring and analysis on a specific...
    2 KB (239 words) - 18:42, 22 October 2024
  • The EINSTEIN System (part of the National Cybersecurity Protection System) is a network intrusion detection and prevention system that monitors the networks...
    26 KB (2,487 words) - 19:19, 28 May 2024
  • applications in cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting...
    37 KB (3,913 words) - 14:06, 25 September 2024
  • HIDS may refer to: Host-based intrusion detection system, in computing Hyper-IgD syndrome, in medicine HID (disambiguation) This disambiguation page lists...
    383 bytes (49 words) - 16:30, 9 July 2018
  • Free Software portal Sagan Intrusion detection system (IDS) Intrusion prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project...
    4 KB (249 words) - 12:12, 29 April 2022
  • Thumbnail for Dorothy E. Denning
    Dorothy E. Denning (category Computer systems researchers)
    security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four...
    20 KB (2,198 words) - 17:21, 3 November 2024
  • Thumbnail for Honeypot (computing)
    honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and analysis...
    28 KB (3,253 words) - 22:26, 8 November 2024
  • Thumbnail for Kismet (software)
    Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports...
    6 KB (584 words) - 20:45, 3 April 2024
  • sharing on its systems. In addition to software, people, devices, and websites can also be whitelisted or blacklisted. Intrusion detection systems are designed...
    5 KB (576 words) - 00:13, 26 December 2023
  • Information and Decision Systems, an interdisciplinary research laboratory of MIT, Cambridge, Massachusetts Linux Intrusion Detection System, a patch to the Linux...
    747 bytes (105 words) - 00:21, 27 June 2024
  • Thumbnail for Sourcefire
    Sourcefire (category Cisco Systems acquisitions)
    network security appliances were based on Snort, an open-source intrusion detection system (IDS). Sourcefire was acquired by Cisco for $2.7 billion in July...
    16 KB (1,424 words) - 06:33, 15 November 2024
  • Thumbnail for Security alarm
    A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security...
    56 KB (7,854 words) - 15:56, 22 November 2024
  • tunnelling them in (D)TLS, allow inspection of encrypted traffic by an intrusion detection system to detect and block malicious activities, allow network surveillance...
    8 KB (773 words) - 07:42, 8 June 2024
  • Ensemble learning systems have shown a proper efficacy in this area. An intrusion detection system monitors computer network or computer systems to identify...
    52 KB (6,574 words) - 06:47, 2 November 2024
  • (Intrusion Detection Message Exchange Format) is a data format used to exchange information between software enabling intrusion detection, intrusion prevention...
    9 KB (1,085 words) - 06:40, 4 February 2023
  • it as an intrusion-detection system (IDS), as it proactively works to find suspicious activity within a computer network, alerting the system administrator...
    4 KB (469 words) - 10:33, 30 July 2024