<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2024-9-2-0-5</article-id><article-id pub-id-type="publisher-id">3492</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ANALYSIS OF OPEN-SOURCE INTRUSION DETECTION&amp;nbsp;AND PREVENTION SYSTEMS FOR INTEGRATION&amp;nbsp;WITH RUSSIAN OPERATING SYSTEMS&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ANALYSIS OF OPEN-SOURCE INTRUSION DETECTION&amp;nbsp;AND PREVENTION SYSTEMS FOR INTEGRATION&amp;nbsp;WITH RUSSIAN OPERATING SYSTEMS&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Nadeikina</surname><given-names>Victoria Sergeevna</given-names></name><name xml:lang="en"><surname>Nadeikina</surname><given-names>Victoria Sergeevna</given-names></name></name-alternatives><email>nice.nadeykina@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>mashechka-81@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2024</year></pub-date><volume>9</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2024/2/ИТ_НР_9_2_5.pdf" /><abstract xml:lang="ru"><p>The article reviewed IDS/IPS such as Snort, Suricata, Fail2Ban and OSSEC, which have open-source code. Their mechanisms for ensuring network security, including architecture, functions, tools and implemented tasks, are analyzed. The possibility of integrating these systems with Russian operating systems is considered. In conclusion, it is emphasized that IDS/IPS are just one of the many layers of protection that must be implemented to ensure effective security. Only an integrated approach to security can be the key to protecting against modern cyber threats.</p></abstract><trans-abstract xml:lang="en"><p>The article reviewed IDS/IPS such as Snort, Suricata, Fail2Ban and OSSEC, which have open-source code. Their mechanisms for ensuring network security, including architecture, functions, tools and implemented tasks, are analyzed. The possibility of integrating these systems with Russian operating systems is considered. In conclusion, it is emphasized that IDS/IPS are just one of the many layers of protection that must be implemented to ensure effective security. Only an integrated approach to security can be the key to protecting against modern cyber threats.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>intrusion detection systems</kwd><kwd>intrusion prevention systems</kwd><kwd>IDS</kwd><kwd>IPS</kwd><kwd>Russian operating systems</kwd><kwd>OS</kwd><kwd>software products</kwd><kwd>security assessment</kwd><kwd>open-source</kwd></kwd-group><kwd-group xml:lang="en"><kwd>intrusion detection systems</kwd><kwd>intrusion prevention systems</kwd><kwd>IDS</kwd><kwd>IPS</kwd><kwd>Russian operating systems</kwd><kwd>OS</kwd><kwd>software products</kwd><kwd>security assessment</kwd><kwd>open-source</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Current cyber threats: The second quarter of 2023. URL: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2023-q2/</mixed-citation></ref><ref id="B2"><mixed-citation>Ashoor A.S., Gore S. Intrusion detection system (IDS) &amp;amp; intrusion prevention system (IPS): Case study&amp;nbsp;// International Journal of Scientific &amp;amp; Engineering Research. &amp;ndash; 2012. &amp;ndash; Т. 2. URL: https://citeseerx.ist.psu.edu/document?repid=rep1&amp;amp;type=pdf&amp;amp;doi=ddcb13f5dc671786b6fef5aa1fc4cc0285c4c79d</mixed-citation></ref><ref id="B3"><mixed-citation>Snort &amp;ndash; Network Instruction Detection. URL: https://www.snort.org/</mixed-citation></ref><ref id="B4"><mixed-citation>Hoover C. Comparative study of snort 3 and suricata intrusion detection systems. &amp;ndash; 2022. URL: https://scholarworks.uark.edu/csceuht/105/</mixed-citation></ref><ref id="B5"><mixed-citation>Home &amp;ndash; Suricata. URL: https://suricata.io/</mixed-citation></ref><ref id="B6"><mixed-citation>Ford M. et al. The process of transferring Fail2ban data to an adaptive corporate intrusion detection and prevention system // SoutheastCon 2016. &amp;ndash; IEEE, 2016. &amp;ndash; pp. 1-4. URL: https://iocscience.org/ejournal/index.php/mantik/article/view/673/434</mixed-citation></ref><ref id="B7"><mixed-citation>How to secure SSH using Fail2Ban. A beginner&amp;#39;s guide. URL: https://itshaman.ru/articles/3016/kak-zashchitit-ssh-s-pomoshchyu-fail2ban-rukovodstvo-dlya-nachinayushchikh</mixed-citation></ref><ref id="B8"><mixed-citation>Security of network connections. URL: https://maximalisimus.github.io/Articles/The-security-of-network-connections.html#part5.0</mixed-citation></ref><ref id="B9"><mixed-citation>OSSEC &amp;ndash; World`s Most Widely Used Host Intrusion Detected System &amp;ndash; HIDS. URL: https://www.ossec.net/</mixed-citation></ref><ref id="B10"><mixed-citation>Teixeira D. et al. OSSEC IDS extension to improve log analysis and override false positive or negative detections //Journal of Sensor and Actuator Networks. &amp;ndash; 2019. &amp;ndash; Т. 8. &amp;ndash; №. 3. &amp;ndash; С. 46. URL: https://www.mdpi.com/2224-2708/8/3/46.</mixed-citation></ref><ref id="B11"><mixed-citation>Pilkevich P.V., Maslova M.A. The influence of relational database indexes on search performance // Threats and risks in the South of Russia in the context of the geopolitical crisis. Achievements and prospects for scientific research of young scientists in the South of Russia: Materials of scientific events: All-Russian conference with international participation; XIX Annual Youth Scientific Conference, Rostov-on-Don, March 15 &amp;ndash; 29, 2023. &amp;ndash; Rostov-on-Don: Federal State Budgetary Institution of Science &amp;quot;Federal Research Center Southern Scientific Center of the Russian Academy of Sciences&amp;quot;, 2023. &amp;ndash; P. 310.</mixed-citation></ref><ref id="B12"><mixed-citation>Implementation of ESG principles in the development strategy of the Russian economy /</mixed-citation></ref><ref id="B13"><mixed-citation>N.G. Vovchenko, N.G. Kuznetsov, E.N. Makarenko [etc.]. &amp;ndash; Rostov-on-Don: Rostov State Economic University &amp;ldquo;RINH&amp;rdquo;, 2022. &amp;ndash; 508 p.</mixed-citation></ref></ref-list></back></article>