DEFEND YOUR DATA

IDS/IPS
Intrusion Detection System (IDS) is used to determine if a computer or network has experienced unauthorized
intrusion. An IDS works like a burglar alarm system. If it detects a possible intrusion, the IDS will send out an alert
or warning which should prompt an administrator to perform further investigation which might include computer
forensics and prosecution. A host-based IDS monitors all traffic on a single host (computer). A network-based IDS
monitors all traffic at a network “point”.

Intrusion Prevention System (IPS) is a device that exercises access control to protect computers or networks from
exploitation. Intrusion prevention technology is considered by some to be an extension of IDS technology, but it is
actually another form of access control, like an application layer firewall. A host-based IPS monitors all traffic on a
single host (computer). A network-based IPS monitors all traffic at a network “point”.

As their name implies, IDS detects suspicious packets & alerts the security admin. IPS prevents suspicious packets
from entering the system or network. The main trade-off is that using IDS will allow an admin to react to danger
after it has occurred, but it may be too late. However, even though IPS may prevent an attack before it occurs,
legitimate packets may also get blocked due to the IPS responding to a “false positive”.


_______________________________________________________________________________________________

Snort

Snort is an open source network intrusion detection and prevention system utilizing a rule-driven language, which
combines the benefits of signature, protocol and anomaly based inspection methods. It is capable of performing
real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searches,
and can be used to detect variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks,
SMB probes, OS fingerprinting attempts, and much more. With millions of downloads to date, Snort is the most
widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard
for the industry.

Home
About
Terms of Use

Free Download  (Unix/Linux)
Free Download  (Windows)

Download Rules

Setup guides


Windows-based Snort documentation

Windows-based Snort forums
Running Snort under Windows  (SANS FAQ)
Whitepaper  (SANS Reading Room)


_______________________________________________________________________________________________

Other Downloads

NetworkWorld Rated Downloads

AirSnare IDS  (Wireless)