Snort

Results: 123



#Item
51Network architecture / TCP/IP stack fingerprinting / TCP/IP / Transmission Control Protocol / Port knocking / P0f / Ip / Port / SYN cookies / Computer network security / Computing / Internet

Advanced Netfilter: Content Replacement (ala  Snort_inline) and Combining Port Knocking with  p0f Michael Rash DEFCON 12

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
52Pcap / Snort / Thresh / Intrusion detection system / Chroot / Firestorm / Network intrusion detection system / Command & Conquer: Tiberian series / Elog / Software / System software / Computer network security

Firestorm Network Intrusion Detection System John Leach [removed]

Add to Reading List

Source URL: www.scaramanga.co.uk

Language: English - Date: 2004-12-10 21:14:27
53Data / Deep packet inspection / Sliding window protocol / Snort / IPv4 / Network packet / Packet Processing / Packet loss / Transmission Control Protocol / Computing / Computer network security / Information

Clear and Present Data: Opaque Traffic and its Security Implications for the Future Andrew M. White∗ , Srinivas Krishnan∗ , Michael Bailey† , Fabian Monrose∗ , Phillip Porras‡ ∗ University of North Carolina a

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:22
54System administration / Su / Password / Snort / ADOdb / Pcap / Software / MySQL / Cross-platform software

MySQL-Datenbank für Snort +ACID 1. Partitionieren /dev/hda1 /dev/hda5

Add to Reading List

Source URL: www.domhan.de

Language: English - Date: 2005-01-16 13:27:15
55Computer security / Intrusion detection system / Snort / Sourcefire Vulnerability Research Team / Sourcefire / Computer network security / Software / System software

EVALUATING THE VIABILITY OF INTRUSION DETECTION SYSTEM BENCHMARKING A Thesis in TCC 402 Presented to: The Faculty of the School of Engineering and Applied Science

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-23 16:30:01
56System software / Cyberwarfare / Intrusion detection system / Intrusion prevention system / Evasion / Snort / Network performance / Type I and type II errors / Throughput / Computer network security / Computer security / Computing

IPS_vs._IDS Similar_on_the_Surface_Polar_Opposites_Underneath white_paper www.getadvanced.net

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-04-16 08:43:37
57Computer network security / Iptables / Netfilter / Snort / Firewall / System software / Software / Computer security

Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
58Computer security / Intrusion detection system / Snort / Network intrusion detection system / Anomaly detection / Martin Roesch / Sourcefire Vulnerability Research Team / Sourcefire / Computer network security / System software / Software

DOC Document

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-23 16:21:20
59Kismet / Monitor mode / KisMAC / Wireshark / Service set / Snort / Cracking of wireless networks / Packet analyzer / Software / Wireless networking / Computing

Kismet Dragorn [removed] July 10, [removed]

Add to Reading List

Source URL: www.kismetwireless.net

Language: English - Date: 2004-07-10 22:47:24
60Computing / Snort / CPU cache / Computer network security / Software / System software

Snort_over_DNA_Silicom_30_07_2012_1.xlsx

Add to Reading List

Source URL: www.ntop.org

Language: English - Date: 2012-09-10 17:36:19
UPDATE