Expand Cut Tags

No cut tags
topaz: (qwrrty)
[personal profile] topaz
What intrusion detection toolkits does the modern Unix admin typically turn to?  Here are some of the ones I'm aware of:
I gather that these choices are not mutually incompatible, either (e.g. Tiger appears to provide a framework that may include Snort, chkrootkit and possibly others).

Those of you who have explored this issue in more depth than I have: what tools do you use and why?  Have you actually experienced an attack while guarded by any of these tools, and how did they perform?
(will be screened)
(will be screened if not validated)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org

May 2018

S M T W T F S
  12345
6789101112
13141516171819
20212223242526
27282930 31  

Most Popular Tags

Style Credit

Page generated Mar. 5th, 2026 11:45 am
Powered by Dreamwidth Studios