Intrusion Detection Tools, Software & Systems

Finding out who is doing what or your network is vital “day to day” management for any IT Networking professional. Hopefully, some of the tools listed in our updated 2020 resource will help you with your tasks.

Need Help? Ask A Question

Posted by Henry Dalziel  |  December 16, 2019  |   Questions / Comments 2

Intrusion Detection Tools, Software & Systems

Recommended Tools  5
Henry Dalziel
Henry Dalziel | December 16, 2019

- C|EH, Security+, MSc Marketing Management;
- Based in Hong Kong for the last five years;
- Cybersecurity Pro & Growth Hacker


In this resource we list a bunch of ‘Intrusion Detection Systems’ software solutions.

Intrusion Detection Systems or simply ‘IDS’ to those in the know, is a software application that is considered as being a vital component within the security ‘defensive in depth’ or ‘layered defence’ – something which is very fashionable at the moment.

For those that are completely new to the world of IDS’s, an IDS is a device or software application that is typically embedded in standalone hardware that monitors a network or systems for malicious activity or policy violations. When a hacker tries to enter a controlled network the IDS is (meant to) kick-in and notify the IT Admin Staff/ Security Team or System Administrators.

Join Our Mailing List & Get Tool Updates / Tutorial Info

Please Share This Resource! [HINT: We'll LOVE YOU for it!]

5 Recommended Tools

Intrusion Detection Tools, Software & Systems


Snort is an open-source network intrusion detection system (NIDS) and network intrusion prevention system (NIPS) that is created by Martin Roesch. Since 2013, Snort has been owned by Cisco. Snort entered as one of the greatest open-source software of all time in InfoWorld’s Open Source Hall of Fame in 2009.

Is Snort Free?
No, Snort is a commercial tool.

Does Snort Work on all Operating Systems?
Snort works on Windows, Linux and MAC OS X operating systems.

What are the Typical Uses for Snort?
This tool is used to detect attacks or probes, including, but not limited to, a common gateway interface, operating system fingerprinting, server message block probes, buffer overflows and stealth port scans. It also has the ability to perform packet logging on IP networks and real-time analysis.


Created by Niels Provos, Honeyd is an open-source program that enables users to create and run virtual hosts on various computer networks. Users can configure these virtual hosts to mimic different types of servers, enabling them to simulate a never-ending number of computer network configurations.

Is Honeyd Free?
Yes, Honeyd is free of charge.

Does Honeyd Work on all Operating Systems?
Honeyd works on Linux operating systems.

What are the Typical Uses for Honeyd?
Honeyd is used primarily in the field of computer security. By using the tool’s ability to mimic several network hosts at once, Honeyd can act as a distraction to threats. If for example, a network has 2 real servers and only one of it is running Honeyd, it will appear that the network is running hundreds of servers to an attacker giving more time for the user to catch the hacker.


OSSEC HIDS is a multi-platform, scalable and open-source host-based intrusion detection system that has a great and powerful correlation and analysis engine. The downloading and use of this product is free of charge.

Does OSSEC HIDS Work on all Operating Systems?
It runs on most operating systems, including Linux, macOS, Solaris, HP-UX, AIX, and Windows.

What are the Typical Uses for OSSEC HIDS?
OSSEC HIDS performs integrity checking, log analysis, time-based alerting, log analysis and active response. It is commonly used as a solution to SEM/SIM and because of its great log analysis engine, a lot of universities, ISPs and companies are running this tool to monitor and analyze their IDS, firewalls, authentication logs, and web servers.


OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the reality many security professionals face: a SIEM is useless without the basic security controls necessary for security visibility.

AlienVault provides ongoing development for OSSIM because we believe that everyone should have access to sophisticated security technologies; this includes the researchers who need a platform for experimentation and the unsung heroes who can’t convince their companies that security is a problem.

Is OSSIM Free?
Yes OSSIM is free to use.

Does OSSIM Work on all Operating Systems?
OSSIM only works for Linux operating systems.

What are the Typical Uses for OSSIM?
The primary use of this tool gives a detailed compilation of tools which when united will grant security and network administrators with a detailed view over each aspect of hosts, physical access devices, networks, and servers. This tool incorporates several tools including OSSEC HIDS and Nagios.


Sguil which is written in tcl/tk, is built for network security analysts. The main component of this tool is the GUI that gives access to session data in realtime. The tool can also capture raw packets. It also facilitates the practice of event-driven analysis and network security monitoring.

Sguil is built by network security analysts for network security analysts. Sguil’s main component is an intuitive GUI that provides access to real-time events, session data, and raw packet captures. Sguil facilitates the practice of Network Security Monitoring and event-driven analysis. The Sguil client is written in tcl/tk.

Is Sguil Free?
Yes, the use of this product is free.

Does Sguil Work on all Operating Systems?
Sguil can be run on any operating system that supports tcl/tk (including Linux, *BSD, Solaris, MacOS, and Win32).

What are the Typical Uses for Sguil?
Sguil is used to tie your IDS alerts into a database of TCP/IP sessions, packet logs, full content, and other information. For most of its data, Sguil uses a backend that enables users to perform SQL queries against various types of security events.

Hacker Tools Categories

Intrusion Detection Tools, Software & Systems

Some Of Our Other Content

You may also like...

USB Keyloggers
USB Keyloggers

Some of these USB Keyloggers work over WiFi and others even email you the keystrokes! Require NO drivers. Just plant and forget.

Blog Post

N00b Hacking
WiFi Hacking Hardware Devices
WiFi Hacking Hardware Devices

We take a look at hardware used by the pro's to hack into Wireless Networks! (Keyloggers, Deauth Tools, Alfa Scanner etc.)

Blog Post

WiFi Hacking
Mobile Encryption Apps
Mobile Encryption Apps

Is WhatsApp safe? What about Telegram? There are dozens of mobile encryption apps...

List Review

Cyber Hacking
Password Cracking Tools
Password Cracking Tools

John The Ripper, Crowbar, L0phtcrack, Medusa, Rainbowcrack, THC Hydra and more!

List Review

Cyber Hacking
Kali Linux Developers
Meet The Kali Linux Developers

Meet the folks behind the Hacking Tools that make Kali Linux so damn awesome

Blog Post

N00b Hacking
OSCP Advice
How Difficult is OSCP? Get expert advice from those that passed!

We've interviewed over 25 Cybersecurity Professionals to ask them that exact question...

Blog Post

N00b Hacking
How To Hack WordPress 2020
How To Hack WordPress 2020

In this (constantly updated) resource we investigate ways to Hack WordPress

Blog Post

N00b Hacking
Pass CEH First Time
Pass CEH First Time: we ask experts in the field

Are you interested in passing CEH? If yes, read on, we have a ton of advice to share

Blog Post

N00b Hacking


Previously Asked Questions (with Answers)

Intrusion detection systems acts as a detector to an anomalies and aims to catch hackers before they do real damage to your network. They can be either network- or host-based. … intrusion detection systems work by either looking for signatures of known attacks or deviations of normal activity.

An Intrusion Prevention System (IPS) is a system security/threat prevention technology that scans network traffic flows to detect and prevent vulnerability exploits.

Perimeter Intrusion Detection Systems (PIDS) are systems that provides help in an external environment detecting presence of intruder which attempts to breach a perimeter.

The two types of intrusion detection systems are 1) HIDS and 2) NIDS. Intrusion detection. IDS/IDPS offerings are generally categorized into two types of solutions: host-based intrusion detection systems (HIDS) and network-based intrusion detection. Intrusion System.

A network intrusion detection system (NIDS) is extremely necessary for network security because it allows you to detect and respond to malicious traffic. The fundamental purpose of an intrusion detection system is to ensure IT personnel is notified when an attack or network intrusion might be taking place.

A host-based intrusion detection system (HIDS) is a supplementary software installed on a system such as a workstation or a server. It offers protection to the individual host and can spot potential attacks and protect critical operating system files. The primary goal of any IDS is to monitor traffic.

Intrusion Detection System (IDS) is a process of tracking the events that occured in a computer system or network and inspecting them for signs of intrusion. The main detection techniques can be classified as misuse detection and anomaly detection. Misuse detection attempts to model abnormal behavior.

A network-based intrusion detection system (NIDS) is used for tracking and examine network traffic to secure a system from network-based threats. A NIDS reads all inbound packets and searches for any suspicious patterns.

An Intrusion Detection System (IDS) is a system which monitors a network traffic for suspicious activity and declares an alert when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching.

A passive IDS is a system that’s configured to only monitor and analyze network traffic activity and alert an operator to potential vulnerabilities and attacks. A passive IDS is not capable of performing any protective or corrective functions on its own.

An intrusion detection system (IDS) is an instrument software application that monitors a network or systems for malicious activity or policy violations.

An IDS can be a hardware device or software application that applies known intrusion signatures to detect and inspect both inbound and outbound network traffic for abnormal activities. This is done through: System file comparisons against malware signatures. Scanning processes that detect signs of harmful patterns.

2 responses to “Intrusion Detection Tools, Software & Systems”

  1. Amy says:

    What can I do to stop my ex from hacking remotely my iPhone?

Leave a Question or Comment:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.