Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Intrusion detection system

Index Intrusion detection system

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. [1]

78 relations: ACARM-ng, Advanced Intrusion Detection Environment, Alarm filtering, Anomaly detection, Anomaly-based intrusion detection system, Antivirus software, Application firewall, Application protocol-based intrusion detection system, Application software, Artificial immune system, Artificial neural network, Authentication, Bell Labs, Bro (software), Bypass switch, Common Lisp, Communication protocol, Computer network, Cyclic redundancy check, Denial-of-service attack, DNS analytics, Domain Name System, Dorothy E. Denning, Ethernet frame, Expert system, Fail2ban, False positives and false negatives, Firewall (computing), Fred Cohen, Gartner, Heuristic (computer science), Honeypot (computing), Host (network), Host-based intrusion detection system, Internet Message Access Protocol, Internet protocol suite, Intrusion Detection Message Exchange Format, John Wiley & Sons, Lawrence Berkeley National Laboratory, Lisp (programming language), Los Alamos National Laboratory, Machine learning, Malware, Microsoft PowerPoint, Multics, National Institute of Standards and Technology, National Security Agency, Network address, Network layer, Network security, ..., Noise (signal processing), OPNET, OSSEC, Pcap, Peter G. Neumann, Prelude SIEM (Intrusion Detection System), Protocol-based intrusion detection system, Real-time adaptive security, Rebecca Bace, Sagan (software), Samhain (software), Security information and event management, Security management, Snort (software), Software-defined protection, Spoofing attack, SRI International, Subnetwork, Sun Microsystems, Suricata (software), Tcpdump, Transport layer, Trojan horse (computing), TZSP, University of California, Davis, User behavior analytics, VAX, Yongguang Zhang. Expand index (28 more) »

ACARM-ng

ACARM-ng (Alert Correlation, Assessment and Reaction Module - next generation) is an open source IDS/IPS system.

New!!: Intrusion detection system and ACARM-ng · See more »

Advanced Intrusion Detection Environment

The Advanced Intrusion Detection Environment (AIDE) was initially developed as a free replacement for Tripwire licensed under the terms of the GNU General Public License (GPL).

New!!: Intrusion detection system and Advanced Intrusion Detection Environment · See more »

Alarm filtering

Alarm filtering, in the context of IT network management, is the method by which an alarm system reports the origin of a system failure, rather than a list of systems failed.

New!!: Intrusion detection system and Alarm filtering · See more »

Anomaly detection

In data mining, anomaly detection (also outlier detection) is the identification of items, events or observations which do not conform to an expected pattern or other items in a dataset.

New!!: Intrusion detection system and Anomaly detection · See more »

Anomaly-based intrusion detection system

An anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous.

New!!: Intrusion detection system and Anomaly-based intrusion detection system · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Intrusion detection system and Antivirus software · See more »

Application firewall

An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service.

New!!: Intrusion detection system and Application firewall · See more »

Application protocol-based intrusion detection system

An application protocol-based intrusion detection system (APIDS) is an intrusion detection system that focuses its monitoring and analysis on a specific application protocol or protocols in use by the computing system.

New!!: Intrusion detection system and Application protocol-based intrusion detection system · See more »

Application software

An application software (app or application for short) is a computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

New!!: Intrusion detection system and Application software · See more »

Artificial immune system

In artificial intelligence, artificial immune systems (AIS) are a class of computationally intelligent, rule-based machine learning systems inspired by the principles and processes of the vertebrate immune system.

New!!: Intrusion detection system and Artificial immune system · See more »

Artificial neural network

Artificial neural networks (ANNs) or connectionist systems are computing systems vaguely inspired by the biological neural networks that constitute animal brains.

New!!: Intrusion detection system and Artificial neural network · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Intrusion detection system and Authentication · See more »

Bell Labs

Nokia Bell Labs (formerly named AT&T Bell Laboratories, Bell Telephone Laboratories and Bell Labs) is an American research and scientific development company, owned by Finnish company Nokia.

New!!: Intrusion detection system and Bell Labs · See more »

Bro (software)

Originally written by Vern Paxson, Bro is an open source Unix based network monitoring framework.

New!!: Intrusion detection system and Bro (software) · See more »

Bypass switch

A bypass switch (or bypass TAP) is a hardware device that provides a fail-safe access port for an in-line active security appliance such as an intrusion prevention system (IPS), next generation firewall (NGFW), etc.

New!!: Intrusion detection system and Bypass switch · See more »

Common Lisp

Common Lisp (CL) is a dialect of the Lisp programming language, published in ANSI standard document ANSI INCITS 226-1994 (R2004) (formerly X3.226-1994 (R1999)).

New!!: Intrusion detection system and Common Lisp · See more »

Communication protocol

In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

New!!: Intrusion detection system and Communication protocol · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Intrusion detection system and Computer network · See more »

Cyclic redundancy check

A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

New!!: Intrusion detection system and Cyclic redundancy check · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Intrusion detection system and Denial-of-service attack · See more »

DNS analytics

DNS Analytics is the surveillance (collection and analysis) of DNS traffic within a computer network.

New!!: Intrusion detection system and DNS analytics · See more »

Domain Name System

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

New!!: Intrusion detection system and Domain Name System · See more »

Dorothy E. Denning

Dorothy Elizabeth Denning, born August 12, 1945, is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations.

New!!: Intrusion detection system and Dorothy E. Denning · See more »

Ethernet frame

A data unit on an Ethernet link transports an Ethernet frame as its payload.

New!!: Intrusion detection system and Ethernet frame · See more »

Expert system

In artificial intelligence, an expert system is a computer system that emulates the decision-making ability of a human expert.

New!!: Intrusion detection system and Expert system · See more »

Fail2ban

Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks.

New!!: Intrusion detection system and Fail2ban · See more »

False positives and false negatives

In medical testing, and more generally in binary classification, a false positive is an error in data reporting in which a test result improperly indicates presence of a condition, such as a disease (the result is positive), when in reality it is not present, while a false negative is an error in which a test result improperly indicates no presence of a condition (the result is negative), when in reality it is present.

New!!: Intrusion detection system and False positives and false negatives · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Intrusion detection system and Firewall (computing) · See more »

Fred Cohen

Frederick B. Cohen (born 1956) is an American computer scientist and best known as the inventor of computer virus defense techniques.

New!!: Intrusion detection system and Fred Cohen · See more »

Gartner

Gartner, Inc. is a global research and advisory firm providing insights, advice, and tools for leaders in IT, Finance, HR, Customer Service and Support, Legal and Compliance, Marketing, Sales, and Supply Chain functions across the world.

New!!: Intrusion detection system and Gartner · See more »

Heuristic (computer science)

In computer science, artificial intelligence, and mathematical optimization, a heuristic (from Greek εὑρίσκω "I find, discover") is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution.

New!!: Intrusion detection system and Heuristic (computer science) · See more »

Honeypot (computing)

In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.

New!!: Intrusion detection system and Honeypot (computing) · See more »

Host (network)

A network host is a computer or other device connected to a computer network.

New!!: Intrusion detection system and Host (network) · See more »

Host-based intrusion detection system

A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces, similar to the way a network-based intrusion detection system (NIDS) operates.

New!!: Intrusion detection system and Host-based intrusion detection system · See more »

Internet Message Access Protocol

In computing, the Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection.

New!!: Intrusion detection system and Internet Message Access Protocol · See more »

Internet protocol suite

The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.

New!!: Intrusion detection system and Internet protocol suite · See more »

Intrusion Detection Message Exchange Format

Used as part of computer security, IDMEF (Intrusion Detection Message Exchange Format) is a data format used to exchange information between software enabling intrusion detection, intrusion prevention, security information collection and management systems that may need to interact with them.

New!!: Intrusion detection system and Intrusion Detection Message Exchange Format · See more »

John Wiley & Sons

John Wiley & Sons, Inc., also referred to as Wiley, is a global publishing company that specializes in academic publishing.

New!!: Intrusion detection system and John Wiley & Sons · See more »

Lawrence Berkeley National Laboratory

Lawrence Berkeley National Laboratory (LBNL), commonly referred to as Berkeley Lab, is a United States national laboratory located in the Berkeley Hills near Berkeley, California that conducts scientific research on behalf of the United States Department of Energy (DOE).

New!!: Intrusion detection system and Lawrence Berkeley National Laboratory · See more »

Lisp (programming language)

Lisp (historically, LISP) is a family of computer programming languages with a long history and a distinctive, fully parenthesized prefix notation.

New!!: Intrusion detection system and Lisp (programming language) · See more »

Los Alamos National Laboratory

Los Alamos National Laboratory (Los Alamos or LANL for short) is a United States Department of Energy national laboratory initially organized during World War II for the design of nuclear weapons as part of the Manhattan Project.

New!!: Intrusion detection system and Los Alamos National Laboratory · See more »

Machine learning

Machine learning is a subset of artificial intelligence in the field of computer science that often uses statistical techniques to give computers the ability to "learn" (i.e., progressively improve performance on a specific task) with data, without being explicitly programmed.

New!!: Intrusion detection system and Machine learning · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Intrusion detection system and Malware · See more »

Microsoft PowerPoint

Microsoft PowerPoint (or simply PowerPoint) is a presentation program, created by Robert Gaskins and Dennis Austin at a software company named Forethought, Inc.

New!!: Intrusion detection system and Microsoft PowerPoint · See more »

Multics

Multics (Multiplexed Information and Computing Service) is an influential early time-sharing operating system, based around the concept of a single-level memory.

New!!: Intrusion detection system and Multics · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Intrusion detection system and National Institute of Standards and Technology · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: Intrusion detection system and National Security Agency · See more »

Network address

A network address is an identifier for a node or host on a telecommunications network.

New!!: Intrusion detection system and Network address · See more »

Network layer

In the seven-layer OSI model of computer networking, the network layer is layer 3.

New!!: Intrusion detection system and Network layer · See more »

Network security

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

New!!: Intrusion detection system and Network security · See more »

Noise (signal processing)

In signal processing, noise is a general term for unwanted (and, in general, unknown) modifications that a signal may suffer during capture, storage, transmission, processing, or conversion.

New!!: Intrusion detection system and Noise (signal processing) · See more »

OPNET

OPNET Technologies, Inc. was a software business that provided performance management for computer networks and applications.

New!!: Intrusion detection system and OPNET · See more »

OSSEC

OSSEC (Open Source HIDS SEcurity) is a free, open-source host-based intrusion detection system (HIDS).

New!!: Intrusion detection system and OSSEC · See more »

Pcap

In the field of computer network administration, pcap (packet capture) consists of an application programming interface (API) for capturing network traffic.

New!!: Intrusion detection system and Pcap · See more »

Peter G. Neumann

Peter Gabriel Neumann (born 1932) is a computer-science researcher who worked on the Multics operating system in the 1960s.

New!!: Intrusion detection system and Peter G. Neumann · See more »

Prelude SIEM (Intrusion Detection System)

Prelude SIEM is a Security information and event management (SIEM).

New!!: Intrusion detection system and Prelude SIEM (Intrusion Detection System) · See more »

Protocol-based intrusion detection system

A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system.

New!!: Intrusion detection system and Protocol-based intrusion detection system · See more »

Real-time adaptive security

Real-time Adaptive Security is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises.

New!!: Intrusion detection system and Real-time adaptive security · See more »

Rebecca Bace

Rebecca "Becky" Gurley Bace (1955 - 2017) was an American computer security expert and pioneer in intrusion detection.

New!!: Intrusion detection system and Rebecca Bace · See more »

Sagan (software)

Sagan is an open source (GNU/GPLv2) multi-threaded, high performance, real-time log analysis & correlation engine developed by Quadrant Information Security that runs on Unix operating systems.

New!!: Intrusion detection system and Sagan (software) · See more »

Samhain (software)

Samhain is an integrity checker and host intrusion detection system that can be used on single hosts as well as large, UNIX-based networks.

New!!: Intrusion detection system and Samhain (software) · See more »

Security information and event management

In the field of computer security, security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM).

New!!: Intrusion detection system and Security information and event management · See more »

Security management

Security management is the identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.

New!!: Intrusion detection system and Security management · See more »

Snort (software)

Snort is a free and open source network intrusion prevention system (IPS) and network intrusion detection system (IDS) created by Martin Roesch in 1998.

New!!: Intrusion detection system and Snort (software) · See more »

Software-defined protection

Software-defined protection (SDP) is a computer network security architecture and methodology that combines network security devices and defensive protections which leverage both internal and external intelligence sources.

New!!: Intrusion detection system and Software-defined protection · See more »

Spoofing attack

In the context of network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

New!!: Intrusion detection system and Spoofing attack · See more »

SRI International

SRI International (SRI) is an American nonprofit research institute headquartered in Menlo Park, California.

New!!: Intrusion detection system and SRI International · See more »

Subnetwork

A subnetwork or subnet is a logical subdivision of an IP network.

New!!: Intrusion detection system and Subnetwork · See more »

Sun Microsystems

Sun Microsystems, Inc. was an American company that sold computers, computer components, software, and information technology services and created the Java programming language, the Solaris operating system, ZFS, the Network File System (NFS), and SPARC.

New!!: Intrusion detection system and Sun Microsystems · See more »

Suricata (software)

Suricata is an open source-based intrusion detection system (IDS) and intrusion prevention system (IPS).

New!!: Intrusion detection system and Suricata (software) · See more »

Tcpdump

tcpdump is a common packet analyzer that runs under the command line.

New!!: Intrusion detection system and Tcpdump · See more »

Transport layer

In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suite and the OSI model.

New!!: Intrusion detection system and Transport layer · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Intrusion detection system and Trojan horse (computing) · See more »

TZSP

TaZmen Sniffer Protocol (TZSP) is an encapsulation protocol used to wrap other protocols.

New!!: Intrusion detection system and TZSP · See more »

University of California, Davis

The University of California, Davis (also referred to as UCD, UC Davis, or Davis), is a public research university and land-grant university as well as one of the 10 campuses of the University of California (UC) system.

New!!: Intrusion detection system and University of California, Davis · See more »

User behavior analytics

User behavior analytics ("UBA") as defined by Gartner is a cybersecurity process about detection of insider threats, targeted attacks, and financial fraud.

New!!: Intrusion detection system and User behavior analytics · See more »

VAX

VAX is a discontinued instruction set architecture (ISA) developed by Digital Equipment Corporation (DEC) in the mid-1970s.

New!!: Intrusion detection system and VAX · See more »

Yongguang Zhang

Yongguang Zhang from the Microsoft Research Beijing, China was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for contributions to software radio technology.

New!!: Intrusion detection system and Yongguang Zhang · See more »

Redirects here:

Active intrusion detection system, Host Intrusion Prevention System, Host intrusion prevention system, Host-based intrusion-prevention system, Intrusion Detection, Intrusion Detection Expert System, Intrusion Detection System, Intrusion Detection Systems, Intrusion Detection and Prevention Systems, Intrusion Prevention System, Intrusion Protection System, Intrusion blocking, Intrusion detection, Intrusion detection and prevention system, Intrusion detection in communication systems, Intrusion detection systems, Intrusion prevention, Intrusion prevention software, Intrusion prevention system, Intrusion prevention system servers, Intrusion prevention systems, Intrusion-detection system, Intrusion-prevention system, Malicious code detection, Need of intrusion detection system, Network Intrusion Prevention System, Network intrusion detection system, Network intrusion-detection system, Network-based IDS, Network-based intrusion detection system, Personal Intrusion Prevention System, RateBasedIPS, Wireless Intrusion Detection.

References

[1] https://en.wikipedia.org/wiki/Intrusion_detection_system

OutgoingIncoming
Hey! We are on Facebook now! »