Unit 6: Snort 6.2 Additional Resources Additional Resources

mac2022-06-30  21

RESOURCES

Snort

Main WebpageFAQUsers ManualPortscan Module README

Snort Research

Improving Intrusion Detection on Snort Rules for Botnet Detection (pdf), Saiyan Saiyod, Youksamay Chanthakoummane, Nunnapus Benjamas, Nattawat Khamphakdee, and Jirayus Chaichawananit, Convergence Security, Vol. 1, 19–40., © 2016 River Publishers.

Snort in the news

Even A Single Computer Can Take Down Big Servers Using BlackNurse Attack, Swati Khandelwal, The Hacker NewsNew Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps, Swati Khandelwal, The Hacker NewsCommand and Control Server Detection: Methods & Best Practices, Garrett Gross, AlienVault

Snort on Linux

The Growing Popularity of the Snort Network IDS, Swayam Prakasha, Open SourceHow to Install Snort NIDS on Ubuntu Linux, Hitesh Jethva, Komand KomunityDetecting malware through DNS queries: a Kali Pi / Snort project, David Longenecker, Security for Real People

Cisco's Relationship to Snort

What is the relationship between Snort and Cisco?, Snort FAQSnort: The World’s Most Widely Deployed IPS Technology, Cisco Products & ServicesCisco Banks On Sourcefire And Snort For Its Security Future, Kelly Jackson Higgins, Dark ReadingCisco spending $2.7B for Sourcefire, company that commercialized Snort open-source security tool, Ellen Messmer, Network World

转载于:https://www.cnblogs.com/sec875/articles/10028760.html

最新回复(0)