Intrusion Detection System (IDS) are available for intrusion detection for both server and network. This section guides you on hardening Debian by using IDS.
These are the identified threats related to Debian software.
Network intrusion must be constantly monitored when the system is connected.
Host intrusion must be constantly monitored when the system is running.
Rootkit and kernel intrusion is not monitored when the system is running.
Here are the list if actions to counter the issues.
Debian does prepare host IDS like Tiger to monitor host settings and local systems.
Debian does prepare network IDS like snort to monitor connected network.
Debian does prepare rootkit IDS like chkrootkit to monitor rootkit temperament.
That's all for hardening Debian by using IDS.