Intrusion Detection

Last Updated on 5 March 2014, Total: 29 Articles and Tutorials

  1. Host-Based IDS vs Network-Based IDS (Part 1)

    This white paper will highlight the association between Network Based and Host based intrusion detection. A product comparison will be incorporated in a following white paper part 2 to assist in the selection of the appropriate IDS for your organization. Important facts and consideration will be highlighted to assist when selecting a sound intrusion detection system. This white paper will... Read More

  2. Intrusion Detection Systems (IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture)

    Due to a growing number of intrusions and since the Internet and local networks have become so ubiquitous, organizations increasingly implementing various systems that monitor IT security breaches. Intrusion Detection Systems (IDS) are those that have recently gained a considerable amount of interest. This is an introductory article to this topic. It gives an overview of several types of detectable... Read More

  3. Understanding Virtual Honeynets

    This white paper serves as a reference and knowledge repository on Honeynets and their function within modern interconnected organizations. Honeynets are used as a counter intrusion strategy when learning about intruder’s trends and tactics. Honeynets give you the ability to identify the tools and attack strategies that intruders use against you. Significant information like the information provided by honeynets proves... Read More

  4. Combat intruders with GFI's latest release of LANguard S.E.L.M.!

    Each day the threat to the security of a corporate network increases and exploited vulnerabilities seem to multiply exponentially. A breached enterprise network can yield trade secrets, expose core business functions or have its information destroyed by intruders bent on profit, mayhem and mischief. In-depth defense is the only solution to this problem in an increasingly interconnected world - and... Read More

  5. What You Need to Know About Intrusion Detection Systems

    Firewalls and other simple boundary devices lack some degree of intelligence when it comes to observing, recognizing, and identifying attack signatures that may be present in the traffic they monitor and the log files they collect. Without sounding critical of such other systems’ capabilities, this deficiency explains why intrusion detection systems are becoming increasingly important in helping to maintain proper... Read More

  6. Keeping IDS In-House

    Many managers and network administrators believe that since they have a firewall constructed by security experts then they are protected from unwarranted attacks and can sleep well at night. Nothing could be further from the truth!... Read More

  7. Kuda idiosz, IDS - What is going on with the IDS?

    While looking through commercial offers for IDS products one may get the impression that in the near future, it will no longer be necessary to have an experienced administrator or security guru to monitor and maintain IT security systems. Already, the administrator’s role is seen as “a monkey with nothing better to do than push a flashing button”. Such a... Read More

  8. Securing Windows 2000 Using an event log monitoring system

    As a network administrator, I’m sure you understand the critical nature of security event ID 529. Well, possibly not. If you have Windows 2000 auditing enabled, you’re probably very familiar with the incredible number of event types that you come across when viewing your Security logs... Read More

  9. Why is a firewall alone not enough? What are IDSes and why are they worth having?

    Is a firewall the ultimate solution? Total reliance on the firewall tool, may provide a false sense of security. The firewall will not work alone (no matter how it is designed or implemented) as it is not a panacea. The firewall is simply one of many tools in a toolkit for IT security policy... Read More