Click here to start

Table of contents

Linux Intrusion Detection Systems

Basic Security

What is an Intrusion Detection System?

How an IDS Works

SOHO NIDS Deployment

Typical Business NIDS Deployment

Large Enterprise NIDS Deployment

What Causes Problems With IDS?

Snort NIDS (1 of 3)

Snort NIDS (2 of 3)

Snort NIDS (3 of 3)

Prelude (1 of 2)

Prelude (2 of 2)

Tripwire and friends

Linux Intrusion Detection System (LIDS)

Analysis Console for Intrusion Detection (ACID)

ACID 2

ACID 3

Swatch and Logcheck

PSAD

Commerical IDS Solutions

Internet IDS resources

End Slide

Author: David Allen

E-mail: lwc@crconsulting.com

Homepage: http://www.crconsulting.com/

Further information:
Copyright 2003 Computer Resources Consulting, Inc.