|
Liquidmatrix: Intrusion Detection Page
|
|
BlackICE NetworkICE Corp.
|
|
External
Network ICE is the premier provider of anti-hacker software for every
system on the Internet. Whether you need to protect thousands of systems
or just one, Network ICE has the product that will protect you.
BlackICE
|
Bro Detecting Network Intruders in Real-Time.
|
|
External
Proceedings of the 7th USENIX Security Symposium, San Antonio, TX,
January 1998. This version of the paper differs from that in the
printed Proceedings in that an error in the performance analysis,
which overstated the load on the FDDI ring by a factor of two, has been corrected.
Bro: Lawrence Berkeley National Laboratory
|
Cisco Secure Intrusion Detection System (NetRanger)
|
|
External
"The Cisco Secure Intrusion Detection System, formerly known as NetRanger,
is built to provide the ease of use, scaling, performance, and reliability
required for an enterprise network operation." --mktg
Cisco SecureIDS
|
External
"As hackers become more sophisticated, traditional intrusion detection
systems (IDS) can't keep pace. Protect your vital operations with a
pioneering IDS: CyberCop Monitor." --mktg
CyberCop Monitor
|
Dragon Network Security Wizards
|
|
External
"The Dragon IDS meets the challenges of watching over a modern network
by providing high speed sensors to detect suspicious activity, forensic
data to determine the impact of network attacks and the scalability to
deploy and manage large numbers of sensors without negatively impacting
the operation of large networks." --mktg
Dragon
|
Intruder Alert Symantec
|
|
External
"Intruder Alert detects unauthorized and malicious activity, keeping
systems, applications and data secure from misuse and abuse. If these
systems are threatened, Intruder Alert can notify you and even take
precautionary actions to prevent information theft or loss." --mktg
Intruder Alert
|
External
"NetProwler's exclusive, patent-pending Stateful Dynamic Signature Inspection
(SDSI) virtual processor not only prevents intruders from exploiting hundreds
of known and new security flaws in real time, but its attack definition wizard
enables network administrators to protect exposed corporate applications and
stop even the most sophisticated assaults." --mktg
NetProwler
|
Network Intrusion Detection NFR
|
|
External
"NFR Network Intrusion Detection (NFR NID) is an intrusion detection
system that unobtrusively monitors networks in real time for activity
such as known attacks, abnormal behavior, unauthorized access attempts
and policy infringements. Information associated with activity that
may be suspicious is recorded and alerts raised as necessary." --mktg
NFR NID
|
NID Lawrence Livermore National Labratory
|
|
External
"The DoD version of NID (called JIDS) is available to DoD entities and DoD
contractors at the DISA INFOSEC Tools Distribution site. If you are a DoD
entity, download JIDS from that location." --mktg
NID LLNL
|
External
"Internet Security Systems (ISS) provides RealSecure, the industry's
first completely integrated host- and network-based intrusion detection platform." --mktg
Realsecure
|
SecureNet Gig Security Appliance Intrusion.com
|
|
External
"Intrusion.com SecureNet Gig is the first integrated intrusion detection
solution designed for gigabit networks. Featuring SecureNet Pro software
pre-installed on a 1U-high, rack-mountable appliance, SecureNet Gig
delivers industry leading throughput performance and accurate attack
detection -- extending network intelligence to the border of the enterprise
and within gigabit backbone DMZs and critical network segments." --mktg
SecureNet Gig Security Appliance
|
External
"SHADOW is the result of a project that was originally called the Cooperative
Intrusion Detection Evaluation and Response (CIDER) project. It was an effort
of NSWC Dahlgren, NFR, NSA, the SANS community and other interested parties
to locate, document, and improve security software. The material on this page
is approved for public release, distribution is unlimited. " --mktg
editor's choice!
SHADOW
|
External
"Snort is a lightweight network intrusion detection system, capable of
performing real-time traffic analysis and packet logging on IP networks.
It can perform protocol analysis, content searching/matching and can be
used to detect a variety of attacks and probes, such as buffer overflows,
stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts,
and much more." --mktg
editor's choice!
Snort
|
External
"Tivoli SecureWay provides a single interface for maintaining security
profiles and policies across heterogeneous systems in mainframe, distributed
and desktop environments." --mktg
Tivoli SecureWay
|
|