"Intrusion detection and intrusion prevention systems (IDS and
IPS, respectively) provide the ability to inspect and analyze
network traffic and either generate alerts or drop traffic in the
event that an attack or a malicious event is detected. They are two
of a number of controls, such as firewalls, designed to protect
your network from a variety of attacks. Both IDS and IPS are
commonly deployed in organization's perimeters to protect
externally-facing assets, like Internet-facing Web services. They
can also be deployed internally to ward off attacks or virus
outbreaks. For example, an IPS sensor that can be configured to
stop the spread of a virus or worm may be located in-line on an
internal network choke point.
"We're going to demonstrate how to quickly install and run the
open source IDS sensor Snort on Red Hat Enterprise Linux 5 (RHEL
5). The instructions below will also generally work for RHEL 4,
CentOS 4 and 5, as well as Fedora Core 5 and 6..."
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.