Date Added: May 2012
Efficiency of Intrusion Detection Systems (IDS) depends on their configuration and coverage of services. The coverage depends on used IDS. In the case of usage in multiple systems, operations might become complex because IDS configurations are still vendor-specific. This paper shows aspects and frame conditions for a multi-vendor IDS implementation under one central administration and notification entity. Subsequent it will be briefly discussed, why current management protocols are not adequate to manage IDS. A short paragraph describes the parameterization methodology to separate baseline configuration and parameterization for individual integrations.