Librenix  
(Show all Snort articles . . .
)  
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Introduction to Intrusion Detection with Snort

Up
vote
Down

This article starts with an overview of IDS, then goes into the Snort IDS package details.
Host-based intrusion detection systems, as the name implies, are installed on each end host and look for attacks directed directly at the host. Most HIDS employ automated checks of log files, file checksums, file and directory permissions, local network port activity, and other basic host security items. HIDS offer the benefit of being able to detect attacks local to the machine or on an encrypted or switched network where a NIDS might have issues. HIDS provide a wealth of forensic data and can often determine whether or not an attack, originating from the local host or the network, succeeded or failed.
 read more | mail this link | score:4845 | -Ray, September 20, 2005
More Sysadmin articles...

Beautiful Abstract Art Prints

admin headlines

Setup Nginx + php-FPM + apc + MariaDB on Debian: The perfect LEMP server

Create Advanced MySQL-based Virtual Hosts on Lighttpd (Ubuntu 12.04)

Installing OpenVZ on CentOS 6.3

phpvirtualbox Tutorial: Headless VirtualBox with HTML interface (Ubuntu 12.04)

Tutorial: Ubuntu 12.04 Samba, tdbsam Server

VirtualBox Tutorial: Set up serial ports between virtual machines

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin