Difference between revisions of "IDSA"
(Created page with "{{Entry |Name=IDSA |Short description=System logger, reference monitor, and intrusion detection system |Full description=IDS/A is a research project to equip trusted applications...") |
(Deletion candidate. Links broken. Email to maintainer broken. Removed from related link RFC.) |
||
Line 2: | Line 2: | ||
|Name=IDSA | |Name=IDSA | ||
|Short description=System logger, reference monitor, and intrusion detection system | |Short description=System logger, reference monitor, and intrusion detection system | ||
− | |Full description=IDS/A is a research project to equip trusted applications with some form of "security awareness." It consists of a combined system logger, reference monitor, and intrusion detection system for applications that lets you monitor and adjust application activity. Features include a powerful logging component and an extensible and modular access control subsystem which can be driven by misuse signatures, anomaly detection modules, or even a human operator. | + | |Full description=[[Category:Candidates for deletion]] This is a candidate for deletion: Links broken. Email to maintainer broken. [[User:Poppy-one|Poppy-one]] ([[User talk:Poppy-one|talk]]) 18:02, 2 August 2018 (EDT) |
− | + | ||
− | + | IDS/A is a research project to equip trusted applications with some form of "security awareness." It consists of a combined system logger, reference monitor, and intrusion detection system for applications that lets you monitor and adjust application activity. Features include a powerful logging component and an extensible and modular access control subsystem which can be driven by misuse signatures, anomaly detection modules, or even a human operator. | |
− | |||
|Homepage URL=http://jade.cs.uct.ac.za/idsa/ | |Homepage URL=http://jade.cs.uct.ac.za/idsa/ | ||
− | | | + | |Is High Priority Project=No |
|Computer languages=C | |Computer languages=C | ||
− | | | + | |Decommissioned or Obsolete=Yes |
− | |||
− | |||
− | |||
− | |||
|Related projects=RFC | |Related projects=RFC | ||
|Keywords=logging,intrusion detection,access control,IDSA | |Keywords=logging,intrusion detection,access control,IDSA | ||
− | |||
− | |||
− | |||
− | |||
− | |||
|Version identifier=0.96.0 | |Version identifier=0.96.0 | ||
|Version date=2003-06-09 | |Version date=2003-06-09 | ||
|Version status=beta | |Version status=beta | ||
|Version download=http://jade.cs.uct.ac.za/idsa/download/idsa-0.96.0.tar.gz | |Version download=http://jade.cs.uct.ac.za/idsa/download/idsa-0.96.0.tar.gz | ||
+ | |Version comment=0.96.0 beta released 2003-06-09 | ||
+ | |Last review by=Craig Hutchinson | ||
+ | |Last review date=2018/08/03 | ||
+ | |Submitted by=Database conversion | ||
+ | |Submitted date=2011-04-01 | ||
+ | |User level=none | ||
+ | |Accepts cryptocurrency donations=No | ||
+ | |Test entry=No | ||
+ | |Is GNU=No | ||
+ | |License verified date=2002-03-21 | ||
+ | }} | ||
+ | {{Project license | ||
+ | |License=LGPL | ||
+ | |License verified by=Janet Casey | ||
|License verified date=2002-03-21 | |License verified date=2002-03-21 | ||
− | |||
}} | }} | ||
{{Person | {{Person | ||
+ | |Real name=Marc Welz | ||
|Role=Maintainer | |Role=Maintainer | ||
− | |||
− | |||
− | |||
}} | }} | ||
{{Person | {{Person | ||
+ | |Real name=See the CREDITS file in the distribution for a complete list | ||
|Role=Contributor | |Role=Contributor | ||
− | |||
− | |||
− | |||
}} | }} | ||
{{Resource | {{Resource | ||
Line 47: | Line 46: | ||
{{Software category | {{Software category | ||
|Interface=daemon | |Interface=daemon | ||
− | |||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
{{Software prerequisite | {{Software prerequisite | ||
Line 73: | Line 67: | ||
|Prerequisite description=GTK 1.2.x | |Prerequisite description=GTK 1.2.x | ||
}} | }} | ||
+ | {{Featured}} |
Latest revision as of 18:02, 2 August 2018
IDSA
http://jade.cs.uct.ac.za/idsa/
System logger, reference monitor, and intrusion detection system
This is a candidate for deletion: Links broken. Email to maintainer broken. Poppy-one (talk) 18:02, 2 August 2018 (EDT)
IDS/A is a research project to equip trusted applications with some form of "security awareness." It consists of a combined system logger, reference monitor, and intrusion detection system for applications that lets you monitor and adjust application activity. Features include a powerful logging component and an extensible and modular access control subsystem which can be driven by misuse signatures, anomaly detection modules, or even a human operator.
Licensing
License
Verified by
Verified on
Notes
Leaders and contributors
Contact(s) | Role |
---|---|
Marc Welz | Maintainer |
See the CREDITS file in the distribution for a complete list | Contributor |
Resources and communication
Audience | Resource type | URI |
---|---|---|
Bug Tracking | mailto:idsa@jade.cs.uct.ac.za |
Software prerequisites
Kind | Description |
---|---|
Weak prerequisite | Linux-PAM |
Required to build | Linux kernel 2.2.x or later |
Weak prerequisite | Guile |
Weak prerequisite | Apache 1.3.x |
Weak prerequisite | GTK 1.2.x |
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.