Snort

Results: 123



#Item
31Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-09-08 20:27:32
32Detecting Network Intruders in Real Time  Vern Paxson ICSI Center for Internet Research (ICIR) International Computer Science Institute and

Detecting Network Intruders in Real Time Vern Paxson ICSI Center for Internet Research (ICIR) International Computer Science Institute and

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-06 03:43:28
33Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-03-05 21:14:30
34Sample Snort Signature alert tcp $EXTERNAL_NET any -> $HOME_NET 139 flow:to_server,established content:

Sample Snort Signature alert tcp $EXTERNAL_NET any -> $HOME_NET 139 flow:to_server,established content:"|eb2f 5feb 4a5e 89fb 893e 89f2|"

Add to Reading List

Source URL: www.icir.org

- Date: 2015-02-06 19:36:25
    35A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

    A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-05-23 21:17:18
    36Sourcefire and ThreatGrid A new perspective on network security Agenda

    Sourcefire and ThreatGrid A new perspective on network security Agenda

    Add to Reading List

    Source URL: www.cisco.com

    Language: English
    37Microsoft Word - A_Novices_Guide_to_Using_Multiple_Layers_of_Snort_to_Defend_the_Home_Network.doc

    Microsoft Word - A_Novices_Guide_to_Using_Multiple_Layers_of_Snort_to_Defend_the_Home_Network.doc

    Add to Reading List

    Source URL: doc.emergingthreats.net

    Language: English - Date: 2008-01-23 20:47:47
    38Global Intrusion Detection in the DOMINO Overlay System Vinod Yegneswaran Paul Barford  ∗

    Global Intrusion Detection in the DOMINO Overlay System Vinod Yegneswaran Paul Barford ∗

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2004-11-17 13:32:19
    39White Paper  The Blended IPS: Leveraging Snort and Optimizing Malware Security An overture to the open source security community.

    White Paper The Blended IPS: Leveraging Snort and Optimizing Malware Security An overture to the open source security community.

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2014-10-20 18:39:36
    40COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

    COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0

    Add to Reading List

    Source URL: www.countersnipe.com

    Language: English - Date: 2014-11-25 12:45:19