Intrusion Detection

Last Updated on 5 March 2014, Total: 29 Articles and Tutorials

  1. Collecting Threat Intelligence (Part 1)

    This two-part article discusses techniques for collecting publicly available information on obscure IP addresses and domain names that pop up anomalously on your network... Read More

  2. Collecting Threat Intelligence (Part 2)

    This article deals with the available resources that help us take informed decisions about unknown systems that are communicating with our network... Read More

  3. Combat intruders with GFI's latest release of LANguard S.E.L.M.!

    Each day the threat to the security of a corporate network increases and exploited vulnerabilities seem to multiply exponentially. A breached enterprise network can yield trade secrets, expose core business functions or have its information destroyed by intruders bent on profit, mayhem and mischief. In-depth defense is the only solution to this problem in an increasingly interconnected world - and... Read More

  4. Developing an Information Security and Risk Management Strategy (Part 1)

    In this two part article we will look at planning a security strategy suitable for the long-term, focusing on the future of security and risk management practices... Read More

  5. Developing an Information Security and Risk Management Strategy (Part 2)

    In this article we will focus on elements that will help develop a comprehensive security strategy for your organisation... Read More

  6. Host-Based IDS vs Network-Based IDS (Part 1)

    This white paper will highlight the association between Network Based and Host based intrusion detection. A product comparison will be incorporated in a following white paper part 2 to assist in the selection of the appropriate IDS for your organization. Important facts and consideration will be highlighted to assist when selecting a sound intrusion detection system. This white paper will... Read More

  7. Host-Based IDS vs Network-Based IDS (Part 2 - Comparative Analysis)

    The second paper in this two part series, this white paper will focus on HIDS (Host Based Intrusion Detection System)and the benefit of a HIDS within a corporate environment. A comparative analysis will also be done representing the industry leaders and will conclude by deriving at a calculated recommendation. This will aid organizations when deciding on a comprehensive HIDS or... Read More

  8. Intrusion Detection Systems (IDS) Part 2 - Classification; methods; techniques

    Due to a growing number of intrusion events and also because the Internet and local networks have become so ubiquitous, organizations are increasingly implementing various systems that monitor IT security breaches. This is the second article devoted to these systems. The previous article dealt with IDS categorization and architecture. At this point we will provide further in depth guidance. This... Read More

  9. Intrusion Detection Systems (IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture)

    Due to a growing number of intrusions and since the Internet and local networks have become so ubiquitous, organizations increasingly implementing various systems that monitor IT security breaches. Intrusion Detection Systems (IDS) are those that have recently gained a considerable amount of interest. This is an introductory article to this topic. It gives an overview of several types of detectable... Read More

  10. Intrusion Detection Systems FAQ

    Intrusion Detection Systems are used to detect malicious activity on your network. This Intrusion Detection Systems FAQ explains different types of network attacks and how to detect them... Read More