- Version
- Download 251
- File Size 13.08 MB
- File Count 1
- Create Date August 24, 2014
- Last Updated April 19, 2022
HAKIN9 STARTERKIT: SNORT EXPOSED
-
- up.time IT Systems Management Review
MICHAEL MUNT
When it comes to the performance and availability of your IT infrastructure and applications, deep, and easy-to-use monitoring is a must.
- up.time IT Systems Management Review
-
- Doug Chick printable: Notes of the Network Administrator
DOUGLAS CHICK
I have computer networking friends that work with various departments of the government, corporations and private companies that are very aware of the possible threats to their computers and networks.
- Doug Chick printable: Notes of the Network Administrator
-
- Writing Snort Rules
Kishin Fatnani – CISSP, GCIH GOLD, GCFA, CCSE R70, CEH, LPT
Snort, as you would know, is a tool used to detect intrusions on a network.
- Writing Snort Rules
-
- Collection and Exploration of Large Data
LUCA DERI, FOUNDER OF NTOP
Why the use of FastBit is a major step ahead when compared with state of the art relational database tools based on relational databases
- Collection and Exploration of Large Data
-
- Improving your custom Snort rules
LEON WARD
While it is easy to create a custom Snort rule, do you know if you are actually making a good one or not? This article introduces some common mistakes I find in custom Snort rules and the potential implications of those mistakes.
- Improving your custom Snort rules
-
- An Unsupervised IDS False Alarm Reduction System – SMART
GINA TJHAI, MARIA PAPADAKI
Signature-based (or rule-based) network IDSs are widely used in many organisations to detect known attacks (Dubrawsky, 2009). A common misconception about IDSs is that they are Plug-and-Play devices that can be installed and then allowed to run autonomously. In reality, this is far from the truth.
- An Unsupervised IDS False Alarm Reduction System – SMART
-
- Content modifiers: Keep it Specific
JOEL ESLER
Without going off the deep-end here and discussing every single Snort rule keyword, I just wanted to touch on a few modifiers that people sometimes misunderstand.
- Content modifiers: Keep it Specific
-
- Deploying Snort as WAF (Web Application Firewall)
SHIVANG BHAGAT & RISHITA ANUBHAI (BLUEINFY APPSECLABS)
In today’s environment, web applications are becoming a popular attack point with attack agents. Attack agent can be a human attacker or an automated worm.
- Deploying Snort as WAF (Web Application Firewall)
-
- Are You Getting the Most out of your IPS?
K. K MOOKHEY
Picture this: a multi-billion dollar global telecom giant has invested millions of dollars into building a state-of-the-art Security Operations Center.
- Are You Getting the Most out of your IPS?
Attached Files
File | |
---|---|
SNORT_Exposed_Hakin9_StarterKit__01_2010.pdf |
(1 views)
Subscribe
0 Comments
Newest