<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
IDS - Intrusion Detection Systems

Let's learn today on IDS - Intrusion Detection Systems: ‪‎isoeh‬


  • Host-based IDS

An agent on a host identifying intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability databases, Access control lists, etc.) and other host activities and state.

In a HIDS, sensors usually consist of a software agent. Some application-based IDS are also part of this category. An example of a HIDS is OSSEC.

  • Network NIDS

Platform identifying intrusions by examining network traffic and monitors multiple hosts.

  • Gain access to network traffic by connecting to a network devices for port mirroring, or a network tap.


  • Sensors are placed at choke points in the network to monitor,in the demilitarized zone (DMZ) or at network borders.


  • Perimeter IDS
  • Detects & pinpoints location of intrusion attempts on perimeter fences of critical infrastructures
  • Electronics or advanced fiber optic cable technology in perimeter fence,for detection of disturbances on the fence
  • VM based IDS

Detect intrusions using virtual machine monitoring.

Read Other Tutorials

Read All Tutorials »

Hacking Tools

Explore All Hacking Tools »
UFTP - UDP based FTP with encryption
UDP based FTP with encryption

UFTP is an encrypted multicast file transfer program for secure, reliable & efficient transfer of files. It also helps in data distribution over a satellite link.

Read Details

Breaking News

Breaking News Of Each Month »
Cyber Scam in the days of Coronavirus & Lockdown
Cyber Scam in the days of Coronavirus & Lockdown

The recent pandemic was unexpected and unknown to most part of the world. It has changed our life and we are slowly adapting to our new lifestyle. The risks associated with the new lifestyle, both personal & corporate, are unknown to most of us.

Read Details