Search results

Results 1 – 20 of 923
Advanced search

Search in namespaces:

There is a page named "Intrusion Detection" on Wikipedia

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations...
    46 KB (5,573 words) - 22:27, 1 August 2024
  • A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing...
    12 KB (1,500 words) - 18:18, 27 March 2024
  • Thumbnail for Perimeter intrusion detection
    A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter...
    4 KB (310 words) - 07:05, 29 November 2023
  • applications in cyber-security, intrusion detection, fraud detection, fault detection, system health monitoring, event detection in sensor networks, detecting...
    38 KB (4,018 words) - 16:30, 27 August 2024
  • An anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring...
    5 KB (557 words) - 02:18, 1 February 2024
  • Thumbnail for Honeypot (computing)
    and honeypots are usually implemented as parts of larger network intrusion detection systems. A honey farm is a centralized collection of honeypots and...
    28 KB (3,252 words) - 18:08, 19 August 2024
  • of unauthorized access points (intrusion detection), and can automatically take countermeasures (intrusion prevention). The primary purpose of a WIPS...
    7 KB (858 words) - 21:59, 12 March 2023
  • Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS)....
    12 KB (1,612 words) - 21:44, 9 August 2023
  • J. Stolfo (2005). "FLIPS: Hybrid Adaptive Intrusion Prevention". Recent Advances in Intrusion Detection. Lecture Notes in Computer Science. Vol. 3858...
    52 KB (6,606 words) - 18:23, 8 August 2024
  • The Advanced Intrusion Detection Environment (AIDE) was initially developed as a free replacement for Tripwire licensed under the terms of the GNU General...
    4 KB (298 words) - 06:42, 22 September 2023
  • A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring...
    2 KB (281 words) - 12:38, 12 July 2024
  • Thumbnail for Suricata (software)
    Suricata (software) (category Intrusion detection systems)
    Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security...
    3 KB (107 words) - 18:56, 17 January 2024
  • Comparison of host-based intrusion detection system components and systems. As per the Unix philosophy a good HIDS is composed of multiple packages each...
    9 KB (425 words) - 23:23, 11 August 2024
  • Snort (software) (category Intrusion detection systems)
    Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch, founder and...
    6 KB (441 words) - 12:10, 5 July 2024
  • OSSEC (category Intrusion detection systems)
    host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based...
    4 KB (433 words) - 09:22, 27 August 2024
  • Thumbnail for Computer case
    report this event the next time it is powered on. This physical intrusion detection system may help computer owners detect tampering with their computers...
    23 KB (2,812 words) - 20:50, 8 August 2024
  • Thumbnail for Dorothy E. Denning
    security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published...
    20 KB (2,198 words) - 09:11, 24 June 2024
  • Extrusion detection or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful...
    1 KB (179 words) - 02:26, 20 March 2024
  • Thumbnail for Physical security
    security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to...
    24 KB (2,303 words) - 01:53, 25 May 2024
  • Thumbnail for Sourcefire
    network security appliances were based on Snort, an open-source intrusion detection system (IDS). Sourcefire was acquired by Cisco for $2.7 billion in...
    19 KB (1,599 words) - 20:02, 26 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)