• Testing an intrusion-detection system

    I'm trying to test our HIDS implementation and want to see intrusion detection system (IDS) responses to a server compromise and a rootkit install. Is there somewhere I can download one of the latest rootkits such as t0rn, tuxkit, etc. so I can install it on a lab server for testing purposes?

    ITKE56,505 pointsBadges:
  • Evaluating and tuning an intrusion-detection system

    A good way to evaluate the quality of competing IDSs.

    searchsecurity9,775 pointsBadges:
  • IDS: Still head of the class in security education

    Despite its "old school" image, a technologist at the CSI Computer Security Conference says intrusion detection offers quite an education in network security.

    Eric Parizo1,890 pointsBadges:
  • Signature-based threats: Moving beyond ‘picking off penguins’

    Network- and host-based IDS and AV products can provide more timely solutions to many threats that currently rely on signatures for detection.

    ITKE56,505 pointsBadges:
  • Firewall architectures for SMB networks

    This tip offers best practices for setting up and administering a network firewall and IDS for an SMB, keeping in mind tight budgets and smaller staffs.

    searchsecurity9,775 pointsBadges:
  • Screencast: Snort — Tactics for basic network analysis

    In this exclusive screencast step-by-step demo, Tom Bowers explains how the Snort open source IDS tool works and illustrates how it can help security pros assess network security.

    searchsecurity9,775 pointsBadges:
  • Firewall and IDS architecture setup for SMBs

    Small and medium-size businesses are a prime candidate for network attacks. Setting up firewalls and intrusion detection systems is easy, inexpensive -- and essential.

    searchsecurity9,775 pointsBadges:
  • Network security monitoring is more than IDS

    In the SearchSecurity.com on-demand Webcast Network Security Monitoring, speakers Richard Bejtlich, senior forensic consultant for Foundstone and Robert Visscher, lead network security services engineer for Ball Corp., discuss how network security monitoring (NSM) goes beyond intrusion-detection...

    Techcopywriter440 pointsBadges:
  • Target-based IDS muffles the noise to take aim on the alerts that count

    Learn how target-based IDS is making IDS a more accurate and efficient network scanning tool.

    searchsecurity9,775 pointsBadges:
  • Gartner declares IDS obsolete by 2005

    Gartner Inc. is predicting that intrusion-detection systems will be obsolete soon, and recommends enterprises migrate to firewalls that block attacks rather than alert.

    MMimoso2,605 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.