Wednesday, March 4, 2020

Best open source intrusion detection tools

In the information society in which we live, it is very important to keep our networks safe. Companies strive to contain and prevent attacks that may endanger that confidential information. For this, there are a number of tools that try to make our system as invulnerable as possible. In this article we will know the 8 best ones, so you can decide if you need to have any of them.

Currently, there are many intrusion detection and prevention systems   ranging from antivirus systems to hierarchical systems , which monitor network traffic. The most common are the following:

 NIDS : Network intrusion detection systems are placed at strategic points in the network to monitor the incoming and outgoing traffic of all network devices. But the exploration of all traffic could lead to the creation of bottlenecks, which affects the overall speed of the network.

 HIDS : Host intrusion detection systems run on machines or devices separate from the network and provide safeguards to the general network against threats from abroad.

 Signature-based IDS : Signature- based IDS monitors all packets in the network and compares them with the signature database, which are preconfigured and default attack patterns. They work similarly to antivirus software.

 Failure-based IDS : These IDS monitor network traffic and compare it to an established baseline. The baseline determines what is considered normal for the network in terms of bandwidth, protocols, ports and other devices, and the IDS alerts the administrator of all types of unusual activity.

 Passive IDS : This IDS system performs simple detection and alert work. Simply alert the administrator of any type of threat and block the activity in question as a preventive measure.
 Reactive identification : detects malicious activity, alerts the administrator of threats and also responds to those threats.

1 comment: