SlideShare a Scribd company logo
PHP-IDS You can’t be what you aren’t
What is an IDS? ,[object Object],[object Object],[object Object],[object Object]
What is PHP-IDS? ,[object Object],[object Object],[object Object],[object Object]
The Good ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Bad ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Ugly ,[object Object],[object Object],[object Object]
False positives ,[object Object],[object Object],[object Object]
False negatives ,[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

01 topologia de_internet
01 topologia de_internet01 topologia de_internet
01 topologia de_internet
velasquezca
 
2015 Fall Conference: Landfill Scale Operations and Maintenance-Carolina Soft...
2015 Fall Conference: Landfill Scale Operations and Maintenance-Carolina Soft...2015 Fall Conference: Landfill Scale Operations and Maintenance-Carolina Soft...
2015 Fall Conference: Landfill Scale Operations and Maintenance-Carolina Soft...
isoswo
 
Ofimatica 2
Ofimatica 2Ofimatica 2
Ofimatica 2
Saray Montes Tovar
 
Increible La Gransabana
Increible La GransabanaIncreible La Gransabana
Increible La Gransabana
josemorales
 
Moreno-Cuban Cultural Activities PPT
Moreno-Cuban Cultural Activities PPTMoreno-Cuban Cultural Activities PPT
Moreno-Cuban Cultural Activities PPTJuan Moreno
 
מכתב המלצה מטרופולינט
מכתב המלצה מטרופולינטמכתב המלצה מטרופולינט
מכתב המלצה מטרופולינטMeni Davidov
 
2015 Fall Conference: Event Recycling-University of Iowa
2015 Fall Conference: Event Recycling-University of Iowa2015 Fall Conference: Event Recycling-University of Iowa
2015 Fall Conference: Event Recycling-University of Iowa
isoswo
 
Square meter investigation new
Square meter investigation newSquare meter investigation new
Square meter investigation new
grade4biss
 
Plans for JCI London 2009
Plans for JCI London 2009Plans for JCI London 2009
Plans for JCI London 2009
JCI London
 
Plan of Action Training 7.11
Plan of Action Training 7.11Plan of Action Training 7.11
Plan of Action Training 7.11
Michael Mitchell, MA in Counseling Education
 
High Wall Mining
High Wall MiningHigh Wall Mining
High Wall Mining
Prateek Sharma
 
Report On Ims
Report On ImsReport On Ims
Report On Ims
aashwin singhal
 
Google Gears
Google GearsGoogle Gears
Google Gears
silenceIT Inc.
 
FITC - Here Be Dragons: Advanced JavaScript Debugging
FITC - Here Be Dragons: Advanced JavaScript DebuggingFITC - Here Be Dragons: Advanced JavaScript Debugging
FITC - Here Be Dragons: Advanced JavaScript Debugging
Rami Sayar
 
Differnt technologies in oc mines
Differnt technologies in oc minesDiffernt technologies in oc mines
Differnt technologies in oc mines
SATYANARAYANA I
 

Viewers also liked (15)

01 topologia de_internet
01 topologia de_internet01 topologia de_internet
01 topologia de_internet
 
2015 Fall Conference: Landfill Scale Operations and Maintenance-Carolina Soft...
2015 Fall Conference: Landfill Scale Operations and Maintenance-Carolina Soft...2015 Fall Conference: Landfill Scale Operations and Maintenance-Carolina Soft...
2015 Fall Conference: Landfill Scale Operations and Maintenance-Carolina Soft...
 
Ofimatica 2
Ofimatica 2Ofimatica 2
Ofimatica 2
 
Increible La Gransabana
Increible La GransabanaIncreible La Gransabana
Increible La Gransabana
 
Moreno-Cuban Cultural Activities PPT
Moreno-Cuban Cultural Activities PPTMoreno-Cuban Cultural Activities PPT
Moreno-Cuban Cultural Activities PPT
 
מכתב המלצה מטרופולינט
מכתב המלצה מטרופולינטמכתב המלצה מטרופולינט
מכתב המלצה מטרופולינט
 
2015 Fall Conference: Event Recycling-University of Iowa
2015 Fall Conference: Event Recycling-University of Iowa2015 Fall Conference: Event Recycling-University of Iowa
2015 Fall Conference: Event Recycling-University of Iowa
 
Square meter investigation new
Square meter investigation newSquare meter investigation new
Square meter investigation new
 
Plans for JCI London 2009
Plans for JCI London 2009Plans for JCI London 2009
Plans for JCI London 2009
 
Plan of Action Training 7.11
Plan of Action Training 7.11Plan of Action Training 7.11
Plan of Action Training 7.11
 
High Wall Mining
High Wall MiningHigh Wall Mining
High Wall Mining
 
Report On Ims
Report On ImsReport On Ims
Report On Ims
 
Google Gears
Google GearsGoogle Gears
Google Gears
 
FITC - Here Be Dragons: Advanced JavaScript Debugging
FITC - Here Be Dragons: Advanced JavaScript DebuggingFITC - Here Be Dragons: Advanced JavaScript Debugging
FITC - Here Be Dragons: Advanced JavaScript Debugging
 
Differnt technologies in oc mines
Differnt technologies in oc minesDiffernt technologies in oc mines
Differnt technologies in oc mines
 

Similar to PHP-IDS

Ips and-ids
Ips and-idsIps and-ids
Ips and-ids
Adam Viet
 
Ibrahim aledeene
Ibrahim aledeeneIbrahim aledeene
Ibrahim aledeene
MohammedAlmuhaimeed
 
Intrusion Prevention Systems
Intrusion Prevention SystemsIntrusion Prevention Systems
Intrusion Prevention Systems
primeteacher32
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
AlienVault
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
John Dorner
 
Network security
Network securityNetwork security
Network security
Shyam Kumar Singh
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
Netwax Lab
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
AnonymousEImkf6RGdQ
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure software
Leigh Honeywell
 
Testingfor Sw Security
Testingfor Sw SecurityTestingfor Sw Security
Testingfor Sw Security
ankitmehta21
 
Chapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfChapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdf
AmanuelZewdie4
 
11 PHP Security #burningkeyboards
11 PHP Security #burningkeyboards11 PHP Security #burningkeyboards
11 PHP Security #burningkeyboards
Denis Ristic
 
IDS
IDSIDS
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.pptch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
asjadzaki2021
 
Logs vs Insiders
Logs vs InsidersLogs vs Insiders
Logs vs Insiders
Anton Chuvakin
 
Firewalls in cryptography
Firewalls in cryptographyFirewalls in cryptography
Firewalls in cryptography
T7Unknown
 
How To Deal With Common Vulnerabilities in Java.pptx
How To Deal With Common Vulnerabilities in Java.pptxHow To Deal With Common Vulnerabilities in Java.pptx
How To Deal With Common Vulnerabilities in Java.pptx
JAMESJOHN130
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
Shah Sheikh
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin
 
Application Security - Myth or Fact Slides
Application Security - Myth or Fact SlidesApplication Security - Myth or Fact Slides
Application Security - Myth or Fact Slides
dfgrumpy
 

Similar to PHP-IDS (20)

Ips and-ids
Ips and-idsIps and-ids
Ips and-ids
 
Ibrahim aledeene
Ibrahim aledeeneIbrahim aledeene
Ibrahim aledeene
 
Intrusion Prevention Systems
Intrusion Prevention SystemsIntrusion Prevention Systems
Intrusion Prevention Systems
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
Network security
Network securityNetwork security
Network security
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure software
 
Testingfor Sw Security
Testingfor Sw SecurityTestingfor Sw Security
Testingfor Sw Security
 
Chapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfChapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdf
 
11 PHP Security #burningkeyboards
11 PHP Security #burningkeyboards11 PHP Security #burningkeyboards
11 PHP Security #burningkeyboards
 
IDS
IDSIDS
IDS
 
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.pptch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
 
Logs vs Insiders
Logs vs InsidersLogs vs Insiders
Logs vs Insiders
 
Firewalls in cryptography
Firewalls in cryptographyFirewalls in cryptography
Firewalls in cryptography
 
How To Deal With Common Vulnerabilities in Java.pptx
How To Deal With Common Vulnerabilities in Java.pptxHow To Deal With Common Vulnerabilities in Java.pptx
How To Deal With Common Vulnerabilities in Java.pptx
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
 
Application Security - Myth or Fact Slides
Application Security - Myth or Fact SlidesApplication Security - Myth or Fact Slides
Application Security - Myth or Fact Slides
 

More from silenceIT Inc.

PHP6 and HTML5
PHP6 and HTML5PHP6 and HTML5
PHP6 and HTML5
silenceIT Inc.
 
Apache JMeter - A brief introduction
Apache JMeter - A brief introductionApache JMeter - A brief introduction
Apache JMeter - A brief introduction
silenceIT Inc.
 
Prototype Seminar
Prototype SeminarPrototype Seminar
Prototype Seminar
silenceIT Inc.
 
JavaServer Pages
JavaServer PagesJavaServer Pages
JavaServer Pages
silenceIT Inc.
 
Bing Webmaster
Bing WebmasterBing Webmaster
Bing Webmaster
silenceIT Inc.
 
Joomla-Content Management System
Joomla-Content Management SystemJoomla-Content Management System
Joomla-Content Management System
silenceIT Inc.
 
JavaScript Leaks
JavaScript LeaksJavaScript Leaks
JavaScript Leaks
silenceIT Inc.
 
JeOS "Juice"
JeOS "Juice"JeOS "Juice"
JeOS "Juice"
silenceIT Inc.
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
silenceIT Inc.
 

More from silenceIT Inc. (9)

PHP6 and HTML5
PHP6 and HTML5PHP6 and HTML5
PHP6 and HTML5
 
Apache JMeter - A brief introduction
Apache JMeter - A brief introductionApache JMeter - A brief introduction
Apache JMeter - A brief introduction
 
Prototype Seminar
Prototype SeminarPrototype Seminar
Prototype Seminar
 
JavaServer Pages
JavaServer PagesJavaServer Pages
JavaServer Pages
 
Bing Webmaster
Bing WebmasterBing Webmaster
Bing Webmaster
 
Joomla-Content Management System
Joomla-Content Management SystemJoomla-Content Management System
Joomla-Content Management System
 
JavaScript Leaks
JavaScript LeaksJavaScript Leaks
JavaScript Leaks
 
JeOS "Juice"
JeOS "Juice"JeOS "Juice"
JeOS "Juice"
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

PHP-IDS