HAKIN9 STARTERKIT: SNORT EXPOSED

Please login or Register to access downloadables
Download
  • Version
  • Download 251
  • File Size 13.08 MB
  • File Count 1
  • Create Date August 24, 2014
  • Last Updated April 19, 2022

HAKIN9 STARTERKIT: SNORT EXPOSED

    • up.time IT Systems Management Review
      MICHAEL MUNT
      When it comes to the performance and availability of your IT infrastructure and applications, deep, and easy-to-use monitoring is a must.



    • Doug Chick printable: Notes of the Network Administrator
      DOUGLAS CHICK
      I have computer networking friends that work with various departments of the government, corporations and private companies that are very aware of the possible threats to their computers and networks.



    • Writing Snort Rules
      Kishin Fatnani – CISSP, GCIH GOLD, GCFA, CCSE R70, CEH, LPT
      Snort, as you would know, is a tool used to detect intrusions on a network.



    • Collection and Exploration of Large Data
      LUCA DERI, FOUNDER OF NTOP
      Why the use of FastBit is a major step ahead when compared with state of the art relational database tools based on relational databases



    • Improving your custom Snort rules
      LEON WARD
      While it is easy to create a custom Snort rule, do you know if you are actually making a good one or not? This article introduces some common mistakes I find in custom Snort rules and the potential implications of those mistakes.



    • An Unsupervised IDS False Alarm Reduction System – SMART
      GINA TJHAI, MARIA PAPADAKI
      Signature-based (or rule-based) network IDSs are widely used in many organisations to detect known attacks (Dubrawsky, 2009). A common misconception about IDSs is that they are Plug-and-Play devices that can be installed and then allowed to run autonomously. In reality, this is far from the truth.



    • Content modifiers: Keep it Specific
      JOEL ESLER
      Without going off the deep-end here and discussing every single Snort rule keyword, I just wanted to touch on a few modifiers that people sometimes misunderstand.



    • Deploying Snort as WAF (Web Application Firewall)
      SHIVANG BHAGAT & RISHITA ANUBHAI (BLUEINFY APPSECLABS)
      In today’s environment, web applications are becoming a popular attack point with attack agents. Attack agent can be a human attacker or an automated worm.



    • Are You Getting the Most out of your IPS?
      K. K MOOKHEY
      Picture this: a multi-billion dollar global telecom giant has invested millions of dollars into building a state-of-the-art Security Operations Center.

Attached Files

File
SNORT_Exposed_Hakin9_StarterKit__01_2010.pdf
(1 views)
April 19, 2022
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023