PostScript version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.
07ce0af9507b3d59633a10839dec73e882872e79cab1fd4d98721ac7e992577d
Text version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.
4af7dd6373c07359980c03139c1927b168d13a6111720b6467405f02a2200192
The top commercial vulnerability scanners have little to no security surrounding their licensing, making them excellent script kiddie tools. These scanners are actively being used by the underground against targets. Simple Nomad
8680c911d931fe25da053d0e8b1565ac46ec28b085e29ad7f6e67d76b651e323
Detecting Intruders in Computer Systems
c0a2eea6e6a278de18bdb30dfd62b34f263c347ef7f82fe7ad019fa295d8b2d2
Software Requirements Specification: Next Generation Intrusion Detection Expert System
c3e288fd4ff59b726be0505b128f06e2b324accaa44dbbaadef51725c726476d
SAFEGUARD Final Report: Detecting Unusual Program Behavior Using the NIDES Statistical Component
475eccf08170416616e8715eaf0794914762f59a5a8dd422e9609347c8d0df3c
The NIDES Statistical Component: Description and Justification
ef55ae33d0db21231d6805ca5bff3095f67383e6110b1f06e023f72f77f8f12f
Automated Audit Trail Analysis and Intrusion Detection: A Survey
6934f56b4df766df8828d813884d1c07679f5f4970c71f7f66bac3dfeb4eeb81