Expand Cut Tags

No cut tags

Feb. 19th, 2008

topaz: (qwrrty)
What intrusion detection toolkits does the modern Unix admin typically turn to?  Here are some of the ones I'm aware of:
I gather that these choices are not mutually incompatible, either (e.g. Tiger appears to provide a framework that may include Snort, chkrootkit and possibly others).

Those of you who have explored this issue in more depth than I have: what tools do you use and why?  Have you actually experienced an attack while guarded by any of these tools, and how did they perform?

May 2018

S M T W T F S
  12345
6789101112
13141516171819
20212223242526
27282930 31  

Most Popular Tags

Style Credit

Page generated Mar. 8th, 2026 04:41 am
Powered by Dreamwidth Studios