How do the different types of intrusion prevention system (IPS) work? Inline systems sit on the network like layer-two bridges, passing traffic along as they receive it. Host-based systems sit on the server, watching the traffic that it sends and receives. Both check packets for any suspicious activity, often using the most …
For a free GPL solution see the Snort inline fork - Suricata
Snort is going to be over taken by Suricata shortly - snort-inline has dies as a project.. (only the inline version is an IPS rather than IDS)
Suricata is 'more free' and as a result has funding by the USA navy (the creators of Tor) and the Dept of homeland security...
Spot the obvious omission?
Errr... where's Snort in the list???
- Apple stuns world with rare SEVEN-way split: What does that mean?
- Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
- RIP net neutrality? FCC boss mulls 'two-speed internet'
- Special report Reg probe bombshell: How we HACKED mobile voicemail without a PIN
- Sony Xperia Z2: 4K vid, great audio, waterproof ... Oh, and you can make a phone call