What is an IDS? What is required for a successful implementation and utilisation? IDS can also be used for penetration testing activities, not just for defence purposes. See how!
This was presented as part of the FIRST Technical Colloquium 2017 Conference in Mauritius on the 30th of November 2017.
Feel free to contact us for more information.
If you are reusing some of the slides or their content, can you please reference our website as the source: https://www.elysiumsecurity.com
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
1. {elysiumsecurity}
Open Source IDS
How to use them as a powerful free
Defensive and Offensive tool
Version: 1.2w
Author: Sylvain Martinez
cyber protection & response
Classification: Public
4. {elysiumsecurity}
Why Listen?
* If you already have a TAP setup
• Understand why you need an IDS;
• How everyone can get started with a free IDS;
• This dashboard in your home/company in less than 2h!*
5. {elysiumsecurity}
Today’s Cyber Security Risk Context
Cyber Security Risks’ probability and impact are increasing.
Their ability to disrupt companies business operation have
growing financial, reputational and legal negative consequences;
This overall diagram is copyright Elysiumsecurity LTD and can only be re-used if the source is referenced as: Sylvain Martinez, https://www.elysiumsecurity.com
Yesterday Tomorrow
100%
0%
TIME
GROWTH
Yesterday Tomorrow
100%
0%
TIME
GROWTH
Yesterday Tomorrow
100%
0%
TIME
GROWTH
9. {elysiumsecurity}
FREE IDS
• Snort based engine;
• Suricata based engine;
• Suites of software available as VM:
- Security Onion (SO): https://securityonion.net/
- SELKS: https://www.stamus-networks.com/open-source/
• Great community is here to help;
• Authors are very active;
• Professional support available from them too;
• Various install guide available: https://www.elysiumsecurity.com/blog/Guides/post7.html