Librenix  
(Show all Snort articles . . .
)  
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Introduction to Intrusion Detection with Snort

Up
vote
Down

This article starts with an overview of IDS, then goes into the Snort IDS package details.
Host-based intrusion detection systems, as the name implies, are installed on each end host and look for attacks directed directly at the host. Most HIDS employ automated checks of log files, file checksums, file and directory permissions, local network port activity, and other basic host security items. HIDS offer the benefit of being able to detect attacks local to the machine or on an encrypted or switched network where a NIDS might have issues. HIDS provide a wealth of forensic data and can often determine whether or not an attack, originating from the local host or the network, succeeded or failed.
 read more | mail this link | score:6212 | -Ray, September 20, 2005
More Sysadmin articles...

Abstract Art on Acrylic Panels

admin headlines

Create a Fiber Channel SAN with SCST and QLogic HBA on Linux Debian 6

Using Multiple PHP Versions (PHP-FPM FastCGI) with ISPConfig 3 (CentOS 6.3)

Tutorial: Striping four nodes with GlusterFS 3.2.x on CentOS 6.3

Tutorial: Install Apache2, PHP5, MySQL on Fedora 17

Tutorial: Basic HTTP authentication with Nginx

Tutorial: Build a CentOS 6.0 x86_64 server

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin