Snort

Results: 123



#Item
41Intrusion detection system / OSSEC / Snort / Intrusion prevention system / NuFW / Alert correlation / System software / Software / Computer network security

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:32
42Computer network security / AAFID / Intrusion detection system / Data security / Petri net / Unified Communist Party of Nepal / Snort / Anomaly detection / CPN Tools / Software / Computer security / System software

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
43Computer security / Iptables / Netfilter / Snort / Firewall / Intrusion detection system / Libipq / Comparison of firewalls / System software / Software / Computer network security

Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
44

Özmen Emre DEMİRKOL ([removed[removed]SNORT­2.3, ACID FEDORA 3 – PF, SNORTSAM OPENBSD 3.6

Add to Reading List

Source URL: csirt.ulakbim.gov.tr

Language: Turkish - Date: 2006-04-07 03:27:28
    45Computer security / Middlebox / Snort / Deep packet inspection / ANts P2P / Intrusion detection system / HTTP Secure / Computer network security / Computing / Software

    BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-03-23 09:24:18
    46Computer network security / Iptables / Netfilter / Snort / Firewall / System software / Software / Computer security

    Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2013-11-03 15:37:37
    47Computer network security / Cyberwarfare / Iptables / Networking hardware / Netfilter / Firewall / Pcap / Libipq / Snort / Software / Computing / System software

    324_IPS_05.qxd[removed]:59 PM

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2013-11-03 15:37:36
    48Computer security / Iptables / Netfilter / Snort / Firewall / Intrusion detection system / Libipq / Comparison of firewalls / System software / Software / Computer network security

    Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org[removed]

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2013-11-03 15:37:36
    49Computer network security / Metasploit Project / Exploit / Snort / Attack / Grep / Transmission Control Protocol / Communications protocol / Software / Computer security / Computing

    Text Crossing the Streams with State Machines in IDS Signature Languages Michael Rash ShmooCon 2014 FireTalks

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2014-01-18 20:47:09
    50Computer security / Cyberwarfare / Iptables / Netfilter / Firewall / Snort / Denial-of-service attack / System software / Software / Computer network security

    fire_03.book Page 173 Monday, August 27, 2007 3:54 PM 10 DEPLOYING FWSNORT With the theoretical discussion in Chapter 9 on the emulation of Snort rule options

    Add to Reading List

    Source URL: www.nostarch.com

    Language: English - Date: 2012-02-08 15:24:21
    UPDATE