RESOURCES
Snort
Main WebpageFAQUsers ManualPortscan Module README
Snort Research
Improving Intrusion Detection on Snort Rules for Botnet Detection (pdf), Saiyan Saiyod, Youksamay Chanthakoummane, Nunnapus Benjamas, Nattawat Khamphakdee, and Jirayus Chaichawananit, Convergence Security, Vol. 1, 19–40., © 2016 River Publishers.
Snort in the news
Even A Single Computer Can Take Down Big Servers Using BlackNurse Attack, Swati Khandelwal, The Hacker NewsNew Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps, Swati Khandelwal, The Hacker NewsCommand and Control Server Detection: Methods & Best Practices, Garrett Gross, AlienVault
Snort on Linux
The Growing Popularity of the Snort Network IDS, Swayam Prakasha, Open SourceHow to Install Snort NIDS on Ubuntu Linux, Hitesh Jethva, Komand KomunityDetecting malware through DNS queries: a Kali Pi / Snort project, David Longenecker, Security for Real People
Cisco's Relationship to Snort
What is the relationship between Snort and Cisco?, Snort FAQSnort: The World’s Most Widely Deployed IPS Technology, Cisco Products & ServicesCisco Banks On Sourcefire And Snort For Its Security Future, Kelly Jackson Higgins, Dark ReadingCisco spending $2.7B for Sourcefire, company that commercialized Snort open-source security tool, Ellen Messmer, Network World
转载于:https://www.cnblogs.com/sec875/articles/10028760.html