Content deleted Content added
m cat |
Procyon117 (talk | contribs) Restore |
||
(12 intermediate revisions by 12 users not shown) | |||
Line 1:
{{More sources needed|date=July 2024}}
A '''protocol-based intrusion detection system''' ('''PIDS
A typical use for a PIDS would be at the front end of a web server monitoring the [[HTTP]] (or [[HTTPS]])
Where HTTPS is in use then this system would need to reside in the "shim" or interface between where HTTPS is [[Cryptography|un-encrypted]] and immediately prior to it entering the Web [[presentation layer]].
==
At a basic level a PIDS would look for, and enforce, the correct use of the protocol.
Line 11 ⟶ 12:
==See also==
* [[Application protocol-based intrusion detection system]] (APIDS)▼
* [[Host-based intrusion detection system]] (HIDS)▼
* [[Intrusion detection system]] (IDS)
* [[Network intrusion detection system]] (NIDS)
▲* [[Host-based intrusion detection system]] (HIDS)
▲* [[Application protocol-based intrusion detection system]] (APIDS)
▲* [[Tripwire (software)]] - a pioneering HIDS
* [[Trusted Computing Group]]
* [[Trusted platform module]]
==References==
[[Category:Security software]]▼
{{Reflist}}
[[Category:Intrusion detection system]]▼
{{DEFAULTSORT:Protocol-Based Intrusion Detection System}}
[[es:PIDS]]
|