Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Snort


1. 

Jay Beale’s Open Source Security Series: Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications

Jay Beale’s Open Source Security Series: Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications

By: Neil Archibald; Gilbert Ramirez; Noam Rathaus; Josh Burke; Brian Caswell; Renaud Deraison

Publisher: Syngress

Publication Date: 19-SEP-2005

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

If you have Snort, Nessus, and Ethereal up and running and now you're ready to customize, code, and torque these tools to their fullest potential, then this book is for you. The authors of this book provide the inside scoop on coding the most effective and efficient Snort rules, Nessus plug-ins with NASL, and Ethereal capture and display filters. When done with this book, you will be a master at coding your own tools to detect malicious traffic, scan for vulnerabilities, and capture only the packets YOU really care about. Each chapter contains dozens of working code examples. Snort is an...

2. 

Snort 2.1 Intrusion Detection, Second Edition

Snort 2.1 Intrusion Detection, Second Edition

By: Jay Beale; Caswell

Publisher: Syngress

Publication Date: 01-MAY-2004

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). You will be given invaluable insight into the code base of Snort, and in...

3. 

Snort Cookbook

Snort Cookbook

By: ; ;

Publisher: O'Reilly Media, Inc.

Publication Date: 29-MAR-2005

Insert Date: 09-JUL-2005

Slots: 1.0

Table of Contents • Start Reading

If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and...

4. 

Managing Security with Snort & IDS Tools

Managing Security with Snort & IDS Tools

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 02-AUG-2004

Insert Date: 13-AUG-2004

Slots: 1.0

Table of Contents • Start Reading

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the...

5. 

Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID

Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID

By: 

Publisher: Prentice Hall

Publication Date: 08-MAY-2003

Insert Date: 22-OCT-2003

Slots: 1.0

Table of Contents • Start Reading

Protect your network with Snort: the high-performance, open source IDS Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all your network traffic in real time; update Snort to reflect new security threats; automate and analyze Snort alerts; and more. Best of all, Rehman's custom scripts integrate Snort with Apache, MySQL, PHP, and ACID-so you can build and optimize a complete IDS...

6. 

Intrusion Detection with Snort

Intrusion Detection with Snort

By: 

Publisher: Sams

Publication Date: 20-MAY-2003

Insert Date: 03-JUL-2003

Slots: 1.0

Table of Contents • Start Reading

With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs...