“This article focuses on several host-based intrusion
detection systems that are available on Linux. In particular, I
will cover some of the basics of installing setting up these
packages, how they are useful, and in what circumstances they can
be used.“
“This article assumes a basic knowledge of systems security. In
particular, I will assume that the most basic security measures
have already been taken to secure a host against intrusion from the
internet.”