Network intrusion detection system
From Wikipedia, the free encyclopedia
In computer security, a Network Intrusion Detection System (NIDS) is an intrusion detection system that attempts to discover unauthorized access to a computer network by analyzing traffic on the network for signs of malicious activity.
- Application protocol-based intrusion detection system (APIDS)
- Bypass switch
- Honeypot (or Honeynet)
- Host-based intrusion detection system (HIDS)
- Intrusion prevention system (IPS)
- Protocol-based intrusion detection system (PIDS)
- Snort, an open source NIDS
- Suricata, another open source NIDS
- Bro, an open source network monitoring framework
|This article needs additional citations for verification. (January 2012)|
- Ptacek, Thomas H. & Newsham, Timothy N. (January 1998); "Insertion, Evasion, and Denial of Service: Eluding Network Instrusion Detection"
- U.S. Defense Information Systems Agency (DISA) Information Assurance Support Environment (IASE)
- EasyIDS - Free customized CentOS install cd containing Snort, Barnyard, BASE, ntop, and more. Most of what's needed for a NIDS.
- SmoothSec - A lightweight and fully ready IDS/IPS Linux (Debian) distribution equipped with Snorby, Snort, Suricata, PulledPork and Pigsty.
- Comprehensive List of Commercial NIDS, Mosaic Security Research
|This computer networking article is a stub. You can help Wikipedia by expanding it.|
|This computer security article is a stub. You can help Wikipedia by expanding it.|