Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Snort


1. 

Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications

Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications

By: Brian Caswell; Jay Beale; Gilbert Ramirez; Noam Rathaus

Publisher: Syngress

Publication Date: 14-SEP-2005

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to “sniff” their network for malicious or unusual traffic. The book will also contain an appendix detailing “the best of the rest” open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they...

2. 

Snort 2.1 Intrusion Detection, Second Edition

Snort 2.1 Intrusion Detection, Second Edition

By: Brian Caswell; Jay Beale

Publisher: Syngress

Publication Date: 06-JUN-2004

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of...

3. 

Snort Cookbook

Snort Cookbook

By: ; ;

Publisher: O'Reilly Media, Inc.

Publication Date: 29-MAR-2005

Insert Date: 09-JUL-2005

Slots: 1.0

Table of Contents • Start Reading

If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and...

4. 

Managing Security with Snort & IDS Tools

Managing Security with Snort & IDS Tools

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 02-AUG-2004

Insert Date: 13-AUG-2004

Slots: 1.0

Table of Contents • Start Reading

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the...

5. 

Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID

Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID

By: 

Publisher: Prentice Hall

Publication Date: 08-MAY-2003

Insert Date: 22-OCT-2003

Slots: 1.0

Table of Contents • Start Reading

Protect your network with Snort: the high-performance, open source IDS Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all your network traffic in real time; update Snort to reflect new security threats; automate and analyze Snort alerts; and more. Best of all, Rehman's custom scripts integrate Snort with Apache, MySQL, PHP, and ACID-so you can build and optimize a complete IDS...

6. 

Intrusion Detection with Snort

Intrusion Detection with Snort

By: 

Publisher: Sams

Publication Date: 20-MAY-2003

Insert Date: 03-JUL-2003

Slots: 1.0

Table of Contents • Start Reading

With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs...