LF Intrusion Detection Alternatives
LF Intrusion Detection is described as 'Lit Fuse Intrusion Detection (LID) protects your Windows system from brute force attacks and other intrusion attempts by placing a brick wall between your server and would-be'. There are more than 10 alternatives to LF Intrusion Detection for Windows, Linux and Mac. The best alternative is Fail2ban, which is both free and Open Source. Other great apps like LF Intrusion Detection are SSHGuard (Free, Open Source), RdpGuard (Paid), Cyberarms Intrusion Detection and Defense System (IDDS) (Free, Open Source) and AiP Defense (Paid).
- SSHGuard monitors services through their logging activity. It reacts to messages about dangerous activity by blocking the source address with the local firewall.
- RdpGuard allows you to protect your Remote Desktop (RDP) from brute-force attacks by blocking attacker's IP address. Fail2Ban for Windows.
- Windows Server brute force protection for Remote Desktop (including NLA), FTP, SMTP, and much more.
Discontinued
Software has been set open-source and abandoned by the main developer. Seems a very good detector but fails to successfully stop attacks. When I have it set to block IPs after 5 failed attempts I shouldn't see multiple entries showing 300 attempts by the same IP addresses.
- Free • Open Source
- Windows
- Your Microsoft Windows servers are probably under constant attack and you may not even know it!
- Protected against RDP-Brute forcers. It installs a service which scans the event log for anomalies every 30 seconds (by default).
- Syspeace is an Intrusion Detection and Prevention System (HIDPS) for brute force attacks on Windows Servers.
- Stops RDP Brute force attack as well as DDoS agaist IIS, FTP, SMTP, and several more.
- win2ban is a Fail2ban implementation for Windows systems. It is a packaging of Fail2ban, Python, Cygwin, Winlogbeat and many other related tools to make it a complete and ready-to-use solution for brute-force attack protection.
- Monitor logs from several sources and execute actions based on some rules. Can be used to protecet against brute-force attacks.