Network Intrusion Detection System

Source: Internet
Author: User

1. Overview of the Black shield network intrusion detection system (HDIDS)
The black shield intrusion detection system (HDIDS) is a self-developed network intrusion detection system developed by Fujian strait Information Technology Co., Ltd. The black shield intrusion detection system (HDIDS) can listen and analyze the data packets on the protected network segment continuously 24 hours a day to determine whether an intrusion has occurred. When an intrusion occurs, responds in real time, records attack events, and blocks attack behaviors based on the preset response.
2. Technical Features of the Black shield network intrusion detection system (HDIDS)
It has a rich and accurate intrusion detection feature library and can identify more than 1400 hacker attack methods (various buffer overflow, port scan, Cgi attach, SMB probe, etc );
Identifies network data packets attacked by hackers in real time, detects illegal attacks on the network in real time, tracks attack locations of intruders, accurately displays data targets and sources, and reports alarms to administrators in a timely manner;
The system can automatically respond to identified hacker attacks in real time (blocking, alerting, system logs, custom alert files, and notification system monitors;
The system automatically records attack events, detailed logs, and a log database with a large capacity to accurately and safely record illegal behaviors.
The system access is very simple and convenient. You do not need to change the existing network topology. You only need to connect the system to the broadcast port or shared Hub of the switch based on the physical structure of the network. network communication is unaffected.
It uses transparent working methods to monitor data streams in the internal network segment without increasing network communication and affecting network transmission efficiency.
The system can be installed with multiple CPUs. For large high-speed networks, you can choose to use a multi-processor, high-performance server.
Supports multi-platform operations. The current version of the console and network engine can run not only on Windows 2000, but also on Linux.
The Linux system supports distributed structures and can be installed in various physical subnets of large networks to monitor large networks.
Graphical management in Chinese, provides a series of graphical management in Chinese, easy to operate, easy to master.
3. hacker attack methods that can be identified by the black shield network intrusion detection system (HDIDS)
Possible backdoor vulnerabilities
Attempted backdoor connection attacks
Distributed Denial of attack
Finger series information collection
Other Vulnerability Data Packets
NETBIOS vulnerability attack
Stack Overflow attacks
PING packet attack
FTP vulnerability attack
TELNET Vulnerability attack
RPC Vulnerability attacks
Attack Scanning
SMTP Network Management Worm
Virus attacks
ICMP attack
Web CGI vulnerability attack
Web ColdFusion vulnerability attack
Web Frontpage vulnerability attack
Web IIS vulnerability attacks
Other Web vulnerability attacks

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.