GreenLake Administration
- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Host based IDS product
Operating System - HP-UX
1849526
Members
6873
Online
104044
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-06-2003 02:29 PM
10-06-2003 02:29 PM
Host based IDS product
Hi,
Is there any product in the market for host based IDS for heterogenious environment (various unix and windows platform).
Any pointer is appreciated.
YC
Is there any product in the market for host based IDS for heterogenious environment (various unix and windows platform).
Any pointer is appreciated.
YC
1 REPLY 1
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-06-2003 02:38 PM
10-06-2003 02:38 PM
Re: Host based IDS product
Hi,
I suppose this depends on what you intend to detect i.e. is it detecting permission changes, account creation attempts or detecting malicious network traffic to the host.
For the former, my preferences:
1) tripwire - file integrity checker
- http://www.tripwire.org
2) chkrootkit - system integrity checker
- http://www.chkrootkit.org
For the later, my preference is snort
- http://www.snort.org
Last but not least, there is also swatch which checks system and network logs for malicious attempts.
Most of these opensource tools compile on multiple *nix platforms and have win32 ports as well.
Not sure if this is what you want. Hope this helps. Regards.
Steven Sim Kok Leong
I suppose this depends on what you intend to detect i.e. is it detecting permission changes, account creation attempts or detecting malicious network traffic to the host.
For the former, my preferences:
1) tripwire - file integrity checker
- http://www.tripwire.org
2) chkrootkit - system integrity checker
- http://www.chkrootkit.org
For the later, my preference is snort
- http://www.snort.org
Last but not least, there is also swatch which checks system and network logs for malicious attempts.
Most of these opensource tools compile on multiple *nix platforms and have win32 ports as well.
Not sure if this is what you want. Hope this helps. Regards.
Steven Sim Kok Leong
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Events and news
Customer resources
© Copyright 2026 Hewlett Packard Enterprise Development LP