Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

3
  • thanks, but I don't see how this directly correlates to my question, as intrusion detection systems generally are used for server security after the server operating system has been setup. rather what I want is how can I make sure that the operating system that was delivered to me does not contain any extra and/or malicious file or functionality. Commented Aug 1, 2019 at 22:06
  • @Moher I thought it has a list of what to expect from a system. Commented Aug 1, 2019 at 22:06
  • I don't know about that. but what I do know is that IDS looks at byte-stream and tries to find patterns whether fixed patterns or using machine learning methods to detect if the byte-stream corresponds to an attack. these systems stand along firewalls mainly to improve server security and are used in many honeypot systems to detect attackers and their intrusion methods in a network. but thanks anyway. Commented Aug 1, 2019 at 22:10