How do the different types of intrusion prevention system (IPS) work? Inline systems sit on the network like layer-two bridges, passing traffic along as they receive it. Host-based systems sit on the server, watching the traffic that it sends and receives. Both check packets for any suspicious activity, often using the most …
For a free GPL solution see the Snort inline fork - Suricata
Snort is going to be over taken by Suricata shortly - snort-inline has dies as a project.. (only the inline version is an IPS rather than IDS)
Suricata is 'more free' and as a result has funding by the USA navy (the creators of Tor) and the Dept of homeland security...
Spot the obvious omission?
Errr... where's Snort in the list???
- Vid Hubble 'scope scans 200,000-ton chunky crumble conundrum
- Bugger the jetpack, where's my 21st-century Psion?
- Google offers up its own Googlers in cloud channel chumship trawl
- Interview Global Warming IS REAL, argues sceptic mathematician - it just isn't THERMAGEDDON
- Apple to grieving sons: NO, you cannot have access to your dead mum's iPad