|
|
|
|
What is
Snort?
Snort® is an open source network intrusion prevention
and detection system utilizing a rule-driven language, which combines
the benefits of signature, protocol and anomaly based inspection
methods. With millions of downloads to date, Snort is the most widely
deployed intrusion detection and prevention technology worldwide and
has become the de facto standard for the industry.
Bulletin: Check Point Software
Technologies to Acquire Sourcefire - Read message from
Marty Roesch
|
|
|
|
|
| Latest VRT Certified Rules Update |
2006-01-27
Sourcefire VRT has added rules and improved detection capabilities. view advisory
| why subscribe? |
| OSSRC |
| The Open Source Snort Rules Consortium (OSSRC) is seeking several qualified individuals for a Rules Overlap Committee. more. |
|
| Usage Tips from the Snort Team |
| To get real-time protocol stats from a running Snort process without exiting, send a SIGUSR1 to the process and it will dump stats to the console or syslog. more |
| Meet Like-minded Users |
Judy Novak of the Snort Team will be at the upcoming Hampton Roads SUG meeting to discuss "Target- BasedTCP Stream Segment Overlaps." more |
|
| Project Spotlight |
Sguil Version 0.6.0
Released!
Sguil (pronounced sgweel) is built by network security analysts for
network security analysts. Sguil's main component is an intuitive GUI
that provides realtime events from snort/barnyard. It also includes
other components which facilitate the practice of Network Security
Monitoring and event driven analysis of IDS alerts.
Read the news announcement.
Read about the Sguil
demo at LinuxWorld. |
| Community Spotlight |
Latest Snort Featured Book
Extrusion Detection: Security Monitoring for Internal Intrusions by
Richard Bejtlich, Tao Security, is a comprehensive guide to preventing,
detecting, and mitigating security breaches from the inside out. You
will learn how to assess threats from internal clients, instrument
networks to detect anomalies in outgoing traffic, architect networks to
resist internal attacks, and respond effectively when attacks occur. Learn more.
|
|
|
|
|
|
|