Snort

Results: 123



#Item
51Advanced Netfilter: Content Replacement (ala  Snort_inline) and Combining Port Knocking with  p0f Michael Rash DEFCON 12

Advanced Netfilter: Content Replacement (ala  Snort_inline) and Combining Port Knocking with  p0f Michael Rash DEFCON 12

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
52Firestorm Network Intrusion Detection System John Leach [removed]

Firestorm Network Intrusion Detection System John Leach [removed]

Add to Reading List

Source URL: www.scaramanga.co.uk

Language: English - Date: 2004-12-10 21:14:27
53Clear and Present Data: Opaque Traffic and its Security Implications for the Future Andrew M. White∗ , Srinivas Krishnan∗ , Michael Bailey† , Fabian Monrose∗ , Phillip Porras‡ ∗ University of North Carolina a

Clear and Present Data: Opaque Traffic and its Security Implications for the Future Andrew M. White∗ , Srinivas Krishnan∗ , Michael Bailey† , Fabian Monrose∗ , Phillip Porras‡ ∗ University of North Carolina a

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:22
54MySQL-Datenbank für Snort +ACID 1. Partitionieren /dev/hda1 /dev/hda5

MySQL-Datenbank für Snort +ACID 1. Partitionieren /dev/hda1 /dev/hda5

Add to Reading List

Source URL: www.domhan.de

Language: English - Date: 2005-01-16 13:27:15
55EVALUATING THE VIABILITY OF INTRUSION DETECTION SYSTEM BENCHMARKING A Thesis in TCC 402 Presented to: The Faculty of the School of Engineering and Applied Science

EVALUATING THE VIABILITY OF INTRUSION DETECTION SYSTEM BENCHMARKING A Thesis in TCC 402 Presented to: The Faculty of the School of Engineering and Applied Science

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-23 16:30:01
56IPS_vs._IDS Similar_on_the_Surface_Polar_Opposites_Underneath white_paper www.getadvanced.net

IPS_vs._IDS Similar_on_the_Surface_Polar_Opposites_Underneath white_paper www.getadvanced.net

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-04-16 08:43:37
57Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
58Computer security / Intrusion detection system / Snort / Network intrusion detection system / Anomaly detection / Martin Roesch / Sourcefire Vulnerability Research Team / Sourcefire / Computer network security / System software / Software

DOC Document

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-23 16:21:20
59Kismet Dragorn [removed] July 10, [removed]

Kismet Dragorn [removed] July 10, [removed]

Add to Reading List

Source URL: www.kismetwireless.net

Language: English - Date: 2004-07-10 22:47:24
60Snort_over_DNA_Silicom_30_07_2012_1.xlsx

Snort_over_DNA_Silicom_30_07_2012_1.xlsx

Add to Reading List

Source URL: www.ntop.org

Language: English - Date: 2012-09-10 17:36:19