Hi, Most of the commercial IDS will operate in this manner http://www.securitywizardry.com/N_ids.htm
Unless you want to analyse information from a different vendors for which a Security Information Manager may offer you the capability http://www.securitywizardry.com/consoles.htm Finally Netflow collectors are here http://www.securitywizardry.com/protNetFlowC.htm And netflow analysers here http://www.securitywizardry.com/protnetflowA.htm Hope this helps Andy Cuff Managing Director / CEO Computer Network Defence Ltd www.SecurityWizardry.com Tel 0870 321 9014 Mob 0701 070 9014 International +44 1225 811777 > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] > Sent: 08 February 2007 18:04 > To: focus-ids@securityfocus.com > Subject: Distributed intrusion detection systems > > Hello! > I'm looking for the examples of distributed intrusion > detection systems. Here I mean intrusion detection systems, > those collect network data from multiple agents and analyze > it using one expert system. > > I'm especially interested in concrete examples of successful > intrusion detections those highlight benefits of distributed > IDS in comparison with multiple usual intrusion detection > systems installed. > > Besides I'm looking for articles on distributed intrusion > detection systems. Detection of traffic flows correlations, > network graph models, graph metrics and network flows > statistics are particularly interesting as used here. > > -------------------------------------------------------------- > ---------- > Test Your IDS > > Is your IDS deployed correctly? > Find out quickly and easily by testing it with real-world > attacks from CORE IMPACT. > Go to > http://www.coresecurity.com/index.php5?module=Form&action=impa > ct&campaign=intro_sfw > to learn more. > -------------------------------------------------------------- > ---------- > > > > ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------