dEEpEst
☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
- Joined
- Mar 29, 2018
- Messages
- 13,861
- Solutions
- 4
- Reputation
- 27
- Reaction score
- 45,548
- Points
- 1,813
- Credits
- 55,350
7 Years of Service
56%







This type is placed at the network level so that it collects and analyzes information from the communication traffic (traffic) at the network level for all communication packets (packets) passing through. The most famous example of NIDS is “Snort”.

“HIDS” is used at the device level so that it collects and analyzes information and then detects suspicious activities at the device level and not at the network level as in the previous type. One of the most famous examples of HIDS is OSSEC.

This type is used at the infrastructure level until danger or access attempts are detected and then alarm devices are triggered accordingly. This type uses either electronics or advanced technologies such as: fiber optic technology.

This type is used in a variety of virtual machines, or what is called (virtual machine). This type is considered modern and was created due to the frequent use of virtual machines recently.