O'Reilly logo

Intrusion Detection with Snort by Jack Koziol

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Picking a Platform

Factors other than raw performance should influence your platform decision. The platform choice you make will ultimately dictate how well Snort functions and the amount of effort you will have to expend to guarantee that Snort runs smoothly. The security posture, stability, and external applications available to work in concert with Snort are all influenced by platform selection.

An IDS must have one of the highest levels of assured security in a network architecture. Having a compromised IDS is much worse than having no IDS at all. After you deploy intrusion detection capability, a degree of trust grows in the idea that your network is being properly monitored for malicious activity. If the IDS is unknowingly compromised, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required