Solved

Best intrusion detection system software for Linux

Posted on 2009-05-04
6
903 Views
Last Modified: 2013-12-16
I need a best Host based and Network based intrusion detection system software (open source) for linux os.
0
Comment
Question by:rajasekarramasamy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
6 Comments
 
LVL 5

Accepted Solution

by:
0ren earned 125 total points
ID: 24293428
you should try snort
http://www.snort.org/
0
 
LVL 5

Expert Comment

by:0ren
ID: 24293437
you can complete the security package with nessus security scanner
http://www.nessus.org/nessus/
0
 

Author Comment

by:rajasekarramasamy
ID: 24293451
Hi 0ren,

The both software you have mentioned above are open source?. From snort site i am unable to download rules for snort.
0
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

 
LVL 5

Expert Comment

by:0ren
ID: 24293477
snort is open source.
with nessus im not sure. its free though.
about the rules did you register ?
you have rules for subscribed , registered and unregistered users.
you will need this section
Sourcefire VRT Certified Rules - The Official Snort Ruleset (registered user release)
on this url
http://www.snort.org/pub-bin/downloads.cgi
0
 

Author Comment

by:rajasekarramasamy
ID: 24293624
I have registerd now. I can able to download rules.

snort is a network based IDS is correct? Is there any Host based IDS for linux?
0
 
LVL 5

Expert Comment

by:0ren
ID: 24294047
yes it is
for HIDS you can try
http://www.ossec.net/
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Syslog-ng works. Now what? How to filter and manage? 8 113
CentOs root password/fsck issue 7 61
Certificate Request CentOS/Apache 1 57
CentOS 7 wireless 2 84
I am a long time windows user and for me it is normal to have spaces in directory and file names. Changing to Linux I found myself frustrated when I moved my windows data over to my new Linux computer. The problem occurs when at the command line.…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Suggested Courses

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question