Overview of Some Windows and Linux Intrusion Detection Tools
()
About this ebook
Dr. Hidaia Mahmood Alassouli
I am Dr. Hidaia Mahmood Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from Gaza Strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http://www.anticorruption.000space.comI am an Author publishing books on kdp.amazon.comand many other book stores such as Google, Apple.com, writinglife.kobo.com, Lulu.com, feiyr.com, blurb.com, bookrix.com, barnesandnoble.com, notionpress.com, ingramspark.com and others . My personal website: http://www.hidaia-alassouli.000space.comMy Amazon Author Central: https://www.amazon.com/-/e/B07BH5HS7LEmail: [email protected]
Read more from Dr. Hidaia Mahmood Alassouli
Introduction to Power System Protection Rating: 4 out of 5 stars4/5Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsReactive Power Compensation Rating: 0 out of 5 stars0 ratingsElectric Power Transmission: Lecture Notes of Electric Power Transmission Course Rating: 5 out of 5 stars5/5Simulation of Some Power Electronics Case Studies in Matlab Simpowersystem Blockset Rating: 2 out of 5 stars2/5Evaluation of Some Virtual Phone Numbers Services Rating: 0 out of 5 stars0 ratingsGeneration of Electrical Power Rating: 5 out of 5 stars5/5Distribution of Electrical Power: Lecture Notes of Distribution of Electrical Power Course Rating: 0 out of 5 stars0 ratingsFootprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks Rating: 0 out of 5 stars0 ratingsEarning Money: through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges Rating: 0 out of 5 stars0 ratingsEvaluation of Some Online Payment Providers Services: Best Online Banks and Visa/Master Cards Issuers Rating: 0 out of 5 stars0 ratingsCreation of Postfix Mail Server Based on Virtual Users and Domains Rating: 0 out of 5 stars0 ratingsQuick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory Rating: 0 out of 5 stars0 ratingsSome Tutorials in Computer Networking Hacking Rating: 0 out of 5 stars0 ratingsMethods to Increase the Internal Storage Space of Android Devices Rating: 0 out of 5 stars0 ratingsReview of the Specifications and Features of Different Smartphones Models Rating: 0 out of 5 stars0 ratingsCreation and Deployment of Smart Contracts on Ethereum Blockchain Rating: 0 out of 5 stars0 ratingsMonitoring of Power System Quality Rating: 0 out of 5 stars0 ratingsEvaluation of Some Text to Speech: Converters, Voice Changers, Video Editors, Animators, Speaking Avatar Makers and Live Streamers Rating: 0 out of 5 stars0 ratingsCreating EPUB E-books Using EPUB Editors and Converters Rating: 0 out of 5 stars0 ratingsControl of DC Motor Using Different Control Strategies Rating: 0 out of 5 stars0 ratingsOverview of Some Voice Over IP Calls and SMS Verifications Services Providers Rating: 0 out of 5 stars0 ratingsStarting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus Rating: 0 out of 5 stars0 ratingsSignal, Audio and Image Processing Rating: 0 out of 5 stars0 ratings
Related to Overview of Some Windows and Linux Intrusion Detection Tools
Related ebooks
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools Rating: 0 out of 5 stars0 ratingsHACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners) Rating: 0 out of 5 stars0 ratingsFootprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks Rating: 0 out of 5 stars0 ratingsLinux: A complete guide to Linux command line for beginners, and how to get started with the Linux operating system! Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Rating: 5 out of 5 stars5/5Hack into your Friends Computer Rating: 0 out of 5 stars0 ratingsHiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing: Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsMetasploit Penetration Testing Cookbook Rating: 0 out of 5 stars0 ratingsSoftware Knowledge Rating: 0 out of 5 stars0 ratingsIn Depth Security Vol. III: Proceedings of the DeepSec Conferences Rating: 0 out of 5 stars0 ratingsLinux Essentials for Hackers & Pentesters Rating: 0 out of 5 stars0 ratingsA Practical Guide Wireshark Forensics Rating: 5 out of 5 stars5/5Ultimate Hacking Challenge: Hacking the Planet, #3 Rating: 5 out of 5 stars5/5Instant Netcat Starter Rating: 4 out of 5 stars4/5Breaking Computer Network with Internet Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsPHP Security and Session Management: Managing Sessions and Ensuring PHP Security (2022 Guide for Beginners) Rating: 3 out of 5 stars3/5Mobile Malware Protection Third Edition Rating: 0 out of 5 stars0 ratingsOSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsMobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS Rating: 1 out of 5 stars1/5Cyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsMastering Metasploit Rating: 0 out of 5 stars0 ratingsHack the Airwaves: Advanced BLE Exploitation Techniques Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsNmap: Network Exploration and Security Auditing Cookbook - Second Edition Rating: 0 out of 5 stars0 ratings
Security For You
Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Cyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Rating: 3 out of 5 stars3/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5Apple Card and Apple Pay: A Ridiculously Simple Guide to Mobile Payments Rating: 0 out of 5 stars0 ratingsThe DIY Guide to Home Wi-Fi Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratings
Reviews for Overview of Some Windows and Linux Intrusion Detection Tools
0 ratings0 reviews
Book preview
Overview of Some Windows and Linux Intrusion Detection Tools - Dr. Hidaia Mahmood Alassouli
Alassouli
Evaluation of Some Windows and Linux Security Tools
GFI LANguard, Nessus, Snort, Base, ACID, Rman, SnortCenter, OSSEC, Sguil
1.Abstract:
The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:
LANguard
Nessus
Snort
BASE
ACID
Rman
SnortCenter.
OSSEC
Sguil
Keywords: Vulnerability Assessment Tools, Intrusion Detection Tools, LANguard, Nessus, Snort, BASE, Rman, OSSEC, Sguil.
2.What it Does:
In this paper I will evaluate some the security tools. Among my work in this area, I found the best site that lists the security tools is http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. There is a good course that covers most of the hacking and security issues, the Certified Ethical Hacking course.
The paper covers the installation and configuration of the following security tools:
LANguard
Nessus
Snort
BASE
Rman
OSSEC
Sguil
3.Vulnerability Assessment Tools:
The following vulnerability assessment tools were tested in order to look for the main differences between them when scanning Linux and Windows machine:
LANguard in Microsoft Windows
Nessuss in Windows and Linux
Some other that can