what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 108 of 108 RSS Feed

Files

lisapaper.ps
Posted Oct 13, 1999
Authored by Martin Roesch

PostScript version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.

tags | paper
SHA-256 | 07ce0af9507b3d59633a10839dec73e882872e79cab1fd4d98721ac7e992577d
lisapaper.txt
Posted Oct 13, 1999
Authored by Martin Roesch

Text version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.

tags | paper
SHA-256 | 4af7dd6373c07359980c03139c1927b168d13a6111720b6467405f02a2200192
scanners.txt
Posted Oct 4, 1999

The top commercial vulnerability scanners have little to no security surrounding their licensing, making them excellent script kiddie tools. These scanners are actively being used by the underground against targets. Simple Nomad

tags | paper
SHA-256 | 8680c911d931fe25da053d0e8b1565ac46ec28b085e29ad7f6e67d76b651e323
canada93.ps
Posted Oct 1, 1999

Detecting Intruders in Computer Systems

tags | paper
SHA-256 | c0a2eea6e6a278de18bdb30dfd62b34f263c347ef7f82fe7ad019fa295d8b2d2
reqts94.ps
Posted Oct 1, 1999

Software Requirements Specification: Next Generation Intrusion Detection Expert System

tags | paper
SHA-256 | c3e288fd4ff59b726be0505b128f06e2b324accaa44dbbaadef51725c726476d
safegard.ps
Posted Oct 1, 1999

SAFEGUARD Final Report: Detecting Unusual Program Behavior Using the NIDES Statistical Component

tags | paper
SHA-256 | 475eccf08170416616e8715eaf0794914762f59a5a8dd422e9609347c8d0df3c
statrept.ps
Posted Oct 1, 1999

The NIDES Statistical Component: Description and Justification

tags | paper
SHA-256 | ef55ae33d0db21231d6805ca5bff3095f67383e6110b1f06e023f72f77f8f12f
survey.ps
Posted Oct 1, 1999

Automated Audit Trail Analysis and Intrusion Detection: A Survey

tags | paper
SHA-256 | 6934f56b4df766df8828d813884d1c07679f5f4970c71f7f66bac3dfeb4eeb81
Page 5 of 5
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close