Chitika

Web Proxy Sharing Session Completed,Now Stay With Us For IDS (Intrusion Detection System).

Releated-Tags

Showing posts with label IDS. Show all posts
Showing posts with label IDS. Show all posts

May 18, 2013

Snort (IDS)

This network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. 

Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. 

Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts.



Snort  is free and open source




Intrusion detection system

An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization.



In Up-coming posts we'll share  about Some Commonly Used IDS(Intrusion-Detection-System).