"This article focuses on several host-based intrusion
detection systems that are available on Linux. In particular, I
will cover some of the basics of installing setting up these
packages, how they are useful, and in what circumstances they can
"This article assumes a basic knowledge of systems security. In
particular, I will assume that the most basic security measures
have already been taken to secure a host against intrusion from the
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.