How do the different types of intrusion prevention system (IPS) work? Inline systems sit on the network like layer-two bridges, passing traffic along as they receive it. Host-based systems sit on the server, watching the traffic that it sends and receives. Both check packets for any suspicious activity, often using the most …
For a free GPL solution see the Snort inline fork - Suricata
Snort is going to be over taken by Suricata shortly - snort-inline has dies as a project.. (only the inline version is an IPS rather than IDS)
Suricata is 'more free' and as a result has funding by the USA navy (the creators of Tor) and the Dept of homeland security...
Spot the obvious omission?
Errr... where's Snort in the list???
- World's OLDEST human DNA found in leg bone – but that's not the only boning going on...
- Lightning strikes USB bosses: Next-gen jacks will be REVERSIBLE
- Pics Brit inventors' GRAVITY POWERED LIGHT ships out after just 1 year
- Microsoft teams up with Feds, Europol in ZeroAccess botnet zombie hunt
- Storagebod Oh no, RBS has gone titsup again... but is it JUST BAD LUCK?