Difference between revisions of "IDSA"

From Free Software Directory
Jump to: navigation, search
(Created page with "{{Entry |Name=IDSA |Short description=System logger, reference monitor, and intrusion detection system |Full description=IDS/A is a research project to equip trusted applications...")
 
(Deletion candidate. Links broken. Email to maintainer broken. Removed from related link RFC.)
 
Line 2: Line 2:
 
|Name=IDSA
 
|Name=IDSA
 
|Short description=System logger, reference monitor, and intrusion detection system
 
|Short description=System logger, reference monitor, and intrusion detection system
|Full description=IDS/A is a research project to equip trusted applications with some form of "security awareness." It consists of a combined system logger, reference monitor, and intrusion detection system for applications that lets you monitor and adjust application activity. Features include a powerful logging component and an extensible and modular access control subsystem which can be driven by misuse signatures, anomaly detection modules, or even a human operator.
+
|Full description=[[Category:Candidates for deletion]] This is a candidate for deletion: Links broken. Email to maintainer broken. [[User:Poppy-one|Poppy-one]] ([[User talk:Poppy-one|talk]]) 18:02, 2 August 2018 (EDT)
|User level=none
+
 
|Status=Live
+
IDS/A is a research project to equip trusted applications with some form of "security awareness." It consists of a combined system logger, reference monitor, and intrusion detection system for applications that lets you monitor and adjust application activity. Features include a powerful logging component and an extensible and modular access control subsystem which can be driven by misuse signatures, anomaly detection modules, or even a human operator.
|Component programs=
 
 
|Homepage URL=http://jade.cs.uct.ac.za/idsa/
 
|Homepage URL=http://jade.cs.uct.ac.za/idsa/
|VCS checkout command=
+
|Is High Priority Project=No
 
|Computer languages=C
 
|Computer languages=C
|Documentation note=
+
|Decommissioned or Obsolete=Yes
|Paid support=
 
|IRC help=
 
|IRC general=
 
|IRC development=
 
 
|Related projects=RFC
 
|Related projects=RFC
 
|Keywords=logging,intrusion detection,access control,IDSA
 
|Keywords=logging,intrusion detection,access control,IDSA
|Is GNU=n
 
|Last review by=Janet Casey
 
|Last review date=2008-01-07
 
|Submitted by=Database conversion
 
|Submitted date=2011-04-01
 
 
|Version identifier=0.96.0
 
|Version identifier=0.96.0
 
|Version date=2003-06-09
 
|Version date=2003-06-09
 
|Version status=beta
 
|Version status=beta
 
|Version download=http://jade.cs.uct.ac.za/idsa/download/idsa-0.96.0.tar.gz
 
|Version download=http://jade.cs.uct.ac.za/idsa/download/idsa-0.96.0.tar.gz
 +
|Version comment=0.96.0 beta released 2003-06-09
 +
|Last review by=Craig Hutchinson
 +
|Last review date=2018/08/03
 +
|Submitted by=Database conversion
 +
|Submitted date=2011-04-01
 +
|User level=none
 +
|Accepts cryptocurrency donations=No
 +
|Test entry=No
 +
|Is GNU=No
 +
|License verified date=2002-03-21
 +
}}
 +
{{Project license
 +
|License=LGPL
 +
|License verified by=Janet Casey
 
|License verified date=2002-03-21
 
|License verified date=2002-03-21
|Version comment=0.96.0 beta released 2003-06-09
 
 
}}
 
}}
 
{{Person
 
{{Person
 +
|Real name=Marc Welz
 
|Role=Maintainer
 
|Role=Maintainer
|Real name=Marc Welz
 
|Email=
 
|Resource URL=
 
 
}}
 
}}
 
{{Person
 
{{Person
 +
|Real name=See the CREDITS file in the distribution for a complete list
 
|Role=Contributor
 
|Role=Contributor
|Real name=See the CREDITS file in the distribution for a complete list
 
|Email=
 
|Resource URL=
 
 
}}
 
}}
 
{{Resource
 
{{Resource
Line 47: Line 46:
 
{{Software category
 
{{Software category
 
|Interface=daemon
 
|Interface=daemon
}}
 
{{Project license
 
|License=LGPL
 
|License verified by=Janet Casey
 
|License verified date=2002-03-21
 
 
}}
 
}}
 
{{Software prerequisite
 
{{Software prerequisite
Line 73: Line 67:
 
|Prerequisite description=GTK 1.2.x
 
|Prerequisite description=GTK 1.2.x
 
}}
 
}}
 +
{{Featured}}

Latest revision as of 18:02, 2 August 2018

[edit]

IDSA

http://jade.cs.uct.ac.za/idsa/
System logger, reference monitor, and intrusion detection system

This is a candidate for deletion: Links broken. Email to maintainer broken. Poppy-one (talk) 18:02, 2 August 2018 (EDT)

IDS/A is a research project to equip trusted applications with some form of "security awareness." It consists of a combined system logger, reference monitor, and intrusion detection system for applications that lets you monitor and adjust application activity. Features include a powerful logging component and an extensible and modular access control subsystem which can be driven by misuse signatures, anomaly detection modules, or even a human operator.



Download

http://jade.cs.uct.ac.za/idsa/download/idsa-0.96.0.tar.gz

version 0.96.0 (beta)
released on 9 June 2003

Decommissioned

Yes



Categories

Related Projects





Licensing

License

Verified by

Verified on

Notes

License

LGPL

Verified by

Janet Casey

Verified on

21 March 2002




Leaders and contributors

Contact(s)Role
Marc Welz Maintainer
See the CREDITS file in the distribution for a complete list Contributor


Resources and communication

AudienceResource typeURI
Bug TrackingE-mailmailto:idsa@jade.cs.uct.ac.za


Software prerequisites

KindDescription
Required to buildLinux kernel 2.2.x or later
Weak prerequisiteGuile
Weak prerequisiteLinux-PAM
Weak prerequisiteApache 1.3.x
Weak prerequisiteGTK 1.2.x

This entry (in part or in whole) was last reviewed on 3 August 2018.



Entry






































Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.