A
P P E N D I X
D
Glossary
his appendix defines some of the most commonly used terms in this
T
book.
Alert A message generated when any intruder activity is detected. Alerts may be sent
in many different forms, e.g., pop up window, logging to screen, e mail and so on.
DMZ
Demilitarized zone.
HIDS
Host Intrusion Detection System. A system that detects intruder activity for a
host.
IDS Intrusion Detection System. A system that detects any intruder activity. Snort is
an example of an IDS.
IDS Signature A pattern that we want to look for in a data packet. Based upon a par 
ticular signature we can define appropriate action to take.
NIDS Network Intrusion Detection System. This is an intrusion detection system that
works for a network. Usually a device (computer or a dedicated device) is placed at
an appropriate location in the network to detect any intruder activity.
Rule Header The first part of each Snort rule. It contains information about action,
protocol, source and destination addresses, port numbers and direction.
Snort Configuration File The snort.conf file, which is the main configura 
tion file for Snort. It is read at the time when Snort starts.
243






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

toronto web hosting

 

Our partners: PHP: Hypertext Preprocessor Cheap Web Hosting JSP Web Hosting Ontario Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Java Hosting Cheapest Hosting

Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved