Showing posts with label intrusion prevention system. Show all posts
Showing posts with label intrusion prevention system. Show all posts

Snort 2.9.2 installation on RHEL 6.2

Threats against an organization's information and integrity are more abundant and insidious than ever, with more than 8 million viruses and other forms of attack added in the last 12 months alone. As a result, organizations continue to turn to intrusion detection and prevention systems as foundational controls for an in-depth defense against identified attacks — while ensuring legitimate traffic reaches its intended destination for continued business operation.

This article describes the process of setting up a Snort Intrusion Detection System 2.9.2 (IDS) with Red Hat Enterprise Linux (RHEL) Server 6.2 on x86/64 hardware. 

Intrusion Detection System with Bash

1. Introduction

For most of us WEP encryption has become a joke.  WPA is quickly going the same way thanks to many tools such as Aircrack-ng. On top of this, wired networks are no strangers to unwanted guests as well.  Anyone serious about security should have a good Intrusion Detection system in their toolbox.

Building a cheap and powerful intrusion-detection system


Snort and BASE

Two packages necessary for creating an effective open-source database areSnort and BASE (Basic Analysis Security Engine). BASE is built on the work of the defunct Analysis Console for Intrusion Databases (ACID) project.
 
Twitter Bird Gadget