{"id":96,"date":"2009-08-21T21:31:00","date_gmt":"2009-08-21T21:31:00","guid":{"rendered":"https:\/\/defragged.org\/ossec\/?p=96"},"modified":"2020-07-02T21:32:25","modified_gmt":"2020-07-02T21:32:25","slug":"qa-ossec-the-open-source-host-based-intrusion-detection-system","status":"publish","type":"post","link":"https:\/\/defragged.org\/ossec\/2009\/08\/qa-ossec-the-open-source-host-based-intrusion-detection-system\/","title":{"rendered":"Q&#038;A: OSSEC, the open source host-based intrusion detection system"},"content":{"rendered":"\n<p>Mirko Zorz from&nbsp;<a href=\"http:\/\/www.net-security.org\/\">Help Net Security<\/a>&nbsp;did an interview with me regarding&nbsp;<a href=\"http:\/\/www.ossec.net\/\">OSSEC<\/a>, how it was created, evolved, etc.<\/p>\n\n\n\n<p>Link to the interview:&nbsp;<a href=\"http:\/\/www.net-security.org\/article.php?id=1284\">http:\/\/www.net-security.org\/article.php?id=1284<\/a>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>Daniel B. Cid is the founder of the open source OSSEC HIDS and a principal researcher at Trend Micro. He has a special interest in intrusion detection, log analysis and secure development. In this interview he discusses the the open source host-based intrusion detection system in detail.<\/p><p><strong>Give our readers some background on the OSSEC project. How did it all start and evolve?<\/strong><\/p><p>OSSEC is an open source HIDS that merges log analysis, file integrity monitoring, rootkit detection and active responses. It started as a side-project to help me solve some problems that I had on a previous job (6-7 years ago)\u2026<\/p><\/blockquote>\n\n\n\n<p>Thanks Mirko for the great questions and interview.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mirko Zorz from&nbsp;Help Net Security&nbsp;did an interview with me regarding&nbsp;OSSEC, how it was created, evolved, etc. Link to the interview:&nbsp;http:\/\/www.net-security.org\/article.php?id=1284. Daniel B. Cid is the founder of the open source OSSEC HIDS and a principal researcher at Trend Micro. He has a special interest in intrusion detection, log analysis and secure development. In this interview [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/posts\/96"}],"collection":[{"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/comments?post=96"}],"version-history":[{"count":1,"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/posts\/96\/revisions"}],"predecessor-version":[{"id":97,"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/posts\/96\/revisions\/97"}],"wp:attachment":[{"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/media?parent=96"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/categories?post=96"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defragged.org\/ossec\/wp-json\/wp\/v2\/tags?post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}