(intrusion monitoring system)

  • 1Intrusion-prevention system — An intrusion prevention system is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real time, to block or prevent those activities. Network based IPS, for example, will… …

    Wikipedia

  • 2Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop …

    Wikipedia

  • 3Host-based intrusion detection system — A host based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the internals of a computing system rather than on its external interfaces (as a network based intrusion detection system (NIDS) would do) …

    Wikipedia

  • 4Protocol-based intrusion detection system — A protocol based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system. A PIDS will monitor the… …

    Wikipedia

  • 5Application protocol-based intrusion detection system — An application protocol based intrusion detection system (APIDS) is an intrusion detection system that focuses its monitoring and analysis on a specific application protocol or protocols in use by the computing system. Overview An APIDS will… …

    Wikipedia

  • 6Network intrusion detection system — A Network Intrusion Detection System (NIDS) is an intrusion detection system that tries to detect malicious activity such as denial of service attacks, port scans or even attempts to crack into computers by Network Security Monitoring (NSM) of… …

    Wikipedia

  • 7Anomaly-based intrusion detection system — An Anomaly Based Intrusion Detection System, is a system for detecting computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous . The classification is based on heuristics or rules, rather than …

    Wikipedia

  • 8Cisco Security Monitoring, Analysis, and Response System — Cisco MARS Company / developer Cisco Systems Working state Current Source model Closed source Latest stable release Cisco Security MARS Appliance 6.0.8 / August 4, 2010 Available language(s) …

    Wikipedia

  • 9Network monitoring — The term network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, pager or other alarms) in case of outages. It is a subset …

    Wikipedia

  • 10Network Monitoring Interface Card — A network monitoring interface card or NMIC is similar to a network card (NIC). However, unlike a standard network card, an NMIC is designed to passively (and silently) listen on a network. At a functional level, an NMIC may differ from a NIC, in …

    Wikipedia