From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Extend IDS with reputation

Extend IDS with reputation

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

Extend IDS with reputation

- [Instructor] Reputation is another technique in combating malicious activities. It's a logical extension of threat intelligence in which the collective intelligence is able to provide a reputational feed to devices to complement the signature-based ID as feeds. AT&T has for many years been providing reputation-based threat intelligence through its AlienVault Open Threat Exchange Reputation Monitor Service. The reputational information collected by AlienVault can be used to provide automated endpoints and system risk detection using two free tools from AlienVault, Endpoint Security and Spiceworks Threat Alerts. Cisco's Talos promotes itself as the world's most comprehensive real-time threat detection network with its databases providing actionable intelligence. An example of how this works can be seen with the Cisco Intrusion Detection Systems which take advantage of information feeds from Cisco's Security Intelligence Operations. The collective nature of widespread event correlation…

Contents