You are here: hacking technology > invades the examination > Content
Hot Articles
Recommend Articles
New Articles
Security precious book most famous five big invasion examination system
  Add date: 07/09/2008   Publishing date: 07/09/2008   Hits: 60
Total 2 pages, Current page:1, Jump to page:
 
The invasion examination system (IDS) inspects the network activity which all enters and sends out, and may confirm that some kind of suspicious pattern, IDS uses this kind of pattern to be able to indicate from attempts to enter (either destruction system) somebody's network attack (or system attack). The invasion examination system and the firewall are different, mainly lies in the firewall attention invasion is to prevent its occurrence. Between the firewall limit network's visit, the goal lies in prevents the invasion, but to does not come from the network internal attack to send out the warning sign. But IDS actually may when the invasion occurs, appraises the suspicious invasion and issues the warning. Moreover IDS may also observe comes from the system internal attack. From this point of view, the IDS possible trouble-free service to do comprehensively. Today we have a look at the following these five most famous invasion examination system.

1.Snort: This is everybody likes nearly opens source IDS, it uses nimbly describes the correspondence based on the rule language, will sign, the agreement and not the normal behavior examination method unifies. Its refresh rate is extremely quick, becomes the whole world to deploy that the most widespread invasion examination technology, and becomes the defense technology the standard. Through the protocol analysis, the content search and various pretreatment procedure, Snort may examine tens of thousands of worms, the crack to use the attempt, the port scanning and each suspicious behavior. Must pay attention in here, user need inspection free BASE analyzes Snort the warning. Like chart:



2.OSSEC HIDS: This opens the source invasion examination system based on the main engine, it may carry out the diary analysis, the complete inspection, the Windows registry surveillance, the rootkit examination, the real-time warning as well as the dynamic at the right moment response. Besides its IDS function, it usually may also serve as a SEM/SIM solution. Because of its formidable diary analysis engine, the Internet supplier, the university and the data central is glad to move OSSEC HIDS, monitors and analyzes its firewall, IDS, the Web server and the identification authentication diary. What like chart demonstration is Windows platform OSSEC:



3.Fragroute/Fragrouter: Is one can evade the network invasion examination the toolbox, this is one from the partition route procedure, it can intercept, revise and rewrites sends out a specific main engine's correspondence, may implement many kinds of attacks, like the insertion, the escape, refuse to serve the attack and so on. It has set of simple rulesets, may to send out some specific main engine's data packet detention transmission, or duplication, discarding, partition, overlap, printing, record, source route track and so on. Strict says, this tool is uses in assisting to test the network invasion examination system, may also assist to test the firewall, basic TCP/IP storehouse behavior. But do not abuse this software.

 
Other pages: : 1 * 2 * Next>>
Prev:Bypasses the CallStack forge return address examination Next:Based on CallStack counter-Rootkit HOOK examination

Comment:

Category: Home > invades the examination