Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Snort - the de facto standard for intrusion detection/prevention
[go: Go Back, main page]

Snort.org home  
Got Source? About Snort About Sourcefire Snort FAQ
Sourcefire Network Security - the creators of Snort

What is Snort?
Snort® is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry.

Bulletin: Check Point Software Technologies to Acquire Sourcefire - Read message from Marty Roesch

Latest training promos.Tshirt slogan contest

Get the latest Snort releaseGet certified with Snort Training!Get your snort stuff!
Latest VRT Certified Rules Update
2006-01-27
Sourcefire VRT has added rules and improved detection capabilities. view advisory | why subscribe?
OSSRC
The Open Source Snort Rules Consortium (OSSRC) is seeking several qualified individuals for a Rules Overlap Committee. more.
Usage Tips from the Snort Team
To get real-time protocol stats from a running Snort process without exiting, send a SIGUSR1 to the process and it will dump stats to the console or syslog. more
Meet Like-minded Users
Snort-heads think alike.Judy Novak of the Snort Team will be at the upcoming Hampton Roads SUG meeting to discuss "Target- BasedTCP Stream Segment Overlaps." more
Project Spotlight
Sguil version 0.6.0 releasedSguil Version 0.6.0 Released!
Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil's main component is an intuitive GUI that provides realtime events from snort/barnyard. It also includes other components which facilitate the practice of Network Security Monitoring and event driven analysis of IDS alerts.

Read the news announcement. Read about the Sguil demo at LinuxWorld.
Community Spotlight
Extrusion Detection: Security Monitoring for Internal IntrusionsLatest Snort Featured Book
Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, Tao Security, is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. You will learn how to assess threats from internal clients, instrument networks to detect anomalies in outgoing traffic, architect networks to resist internal attacks, and respond effectively when attacks occur. Learn more.