Meet the Guide Editor
Message from the Editor:
Intrusion detection was a subject of my Masters thesis. At that time my thesis was on using hexadecimal code in place of base 10 numbers to identify intrusion and using artificial intelligence as the method of detecting it.
Editor Article Picks:
Intrusion Detection Contributors

All About Intrusion Detection

Most networks have a firewall designed to keep out hackers, viruses, worms, or other other malware. But once the malware gets through, another set of protocols needs to be in place to actually detect what the software is, or who is the intruder, and how to stop it dead in its tracks before it gets out of control. Intrusion detection systems have a variety of controls, offer a different set of schemes, and pursue the attack in different ways. Some are disabled, some are identified in a log file, some try to trace back the origin of the attack. The Brighthub guide to Intrusion detection explains these concepts and more.

intrusion-detection

Image: http://dcs.ics.forth.gr/Activities/Projects/ids.html

Latest Articles on Intrusion Detection
Snort Review - Open Source Intrusion Detection and Prevention

You may be wondering about IDS and IPS, and which system has a proven track record, excellent performance and accuracy, and what will be around for the long term. If you haven't...

What Is a Honeypot?

Hackers and crackers are constantly scanning and searching the networks on the Internet to find soft targets to exploit. The sheer volume of systems and large IP address space available...

Most Popular Articles on Intrusion Detection
  •  
    Network Intrusion Detection Systems: a 101

    Network Intrusion Detection Systems (NIDS) exist to detect attacks directed at networks. They work by analyzing packets (captured by sensors) that travel across the network during communications...

  •  
    Snort Review - Open Source Intrusion Detection and Prevention

    You may be wondering about IDS and IPS, and which system has a proven track record, excellent performance and accuracy, and what will be around for the long term. If you haven't heard of Snort, you...

  •  
    Tips for Avoiding Breaches in Data Security

    Breaches in data security are avoidable. Defense in depth is a key component in protecting the data of an organization. Perimeter security, internal security and training for all employees mitigate the...

  •  
    The Top 5 Free Port Scanners

    Port scanners are key tools for network and systems security professionals. Fortunately, the best of these are free and/or Open Source. This article examines and compares the top five free port scanners...

  •  
    Demystifying Unified Threat Management (UTM)

    The Unified Threat Management ( UTM) software isn't really complicated even though it has a lot of software within it, which makes it a package. So what exactly is it? How does UTM work?...

More About Intrusion Detection
Tips for Avoiding Breaches in Data Security

Breaches in data security are avoidable. Defense in depth is a key component in protecting the data of an organization. Perimeter security, internal security and training for all employees...

The Top 5 Free Port Scanners

Port scanners are key tools for network and systems security professionals. Fortunately, the best of these are free and/or Open Source. This article examines and compares the top...