Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,201,239 members, 7,977,691 topics. Date: Thursday, 17 October 2024 at 12:03 PM

How To Use IDS To Monitor Assets & Networks For Malicious Activities - Programming - Nairaland

Nairaland Forum / Science/Technology / Programming / How To Use IDS To Monitor Assets & Networks For Malicious Activities (132 Views)

How To Install & Configure Snort IDS On Ubuntu / Poly Network Hacker Returns $342 Million Of Stolen Assets / My Social Networks For Sale (2) (3) (4)

(1) (Reply)

How To Use IDS To Monitor Assets & Networks For Malicious Activities by CompuQaz: 10:09am On Jun 09
Intrusion Detection Systems (IDS) are tools that use signatures or rules to monitor and analyze network or systems for malicious activity or policy violations. Some of the functions of an IDS include but not limited to the detection of malicious activity, network traffic monitoring, alerting and notification, policy enforcement, incident response, etc.

Suricata is an open-source IDS developed by the Open Information Security Foundation (OISF) and could also function as an intrusion prevention system (IPS) and Network Security Monitoring (NSM).

Watch this tutorial on how to install and configure Suricata for use as an IDS and IPS:

https://www.youtube.com/watch?v=8Q3Nhyvh-1I&t=9s

(1) (Reply)

What Will The Next Generation Technology Look Like? / Unlock Your Tech Potential With Laptop Deals! / Telegram Stars

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 6
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.