Focus on IDS Mode:
(Page 9 of 199)  < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >
Workshop on the Analysis of System Logs (WASL) 2009 2009-06-16
Greg Bronevetsky (greg bronevetsky com)
Workshop on the Analysis of System Logs (WASL) 2009
http://www.systemloganalysis.com Call for Papers

===============================
October 14, 2009
Big Sky, MT
(at SOSP)
==

[ more ]  [ reply ]
An insider attack scenario 2009-06-10
pamaclark yahoo com (8 replies)
Hi,

I'm new to IDS/IPS...

Suppose a company has a large network, which is divided into several sub-network segments. Due to finance or staffs restrictions, the company could only use a limited number of sensors, hence leave some internal sub-networks unmonitored. I guess this is quite common in re

[ more ]  [ reply ]
AW: An insider attack scenario 2009-06-16
Daniel, Akos (a daniel drillisch-telecom de)
Re: An insider attack scenario 2009-06-11
Nick Besant (lists hwf cc)
Re: An insider attack scenario 2009-06-10
Todd Haverkos (infosec haverkos com)
Re: An insider attack scenario 2009-06-10
Tommy May (tommymay comcast net)
Re: An insider attack scenario 2009-06-10
Joel Esler (eslerj gmail com)
Re: An insider attack scenario 2009-06-10
Jeremy Bennett (jeremyfb mac com)
Re: An insider attack scenario 2009-06-10
Ron Gula (rgula tenablesecurity com)
Re: An insider attack scenario 2009-06-10
Thrynn (thrynn404 gmail com)
AW: Need help/info 2009-06-09
Daniel, Akos (a daniel drillisch-telecom de)
Hi ubernewbie,

I tried the "freeword's toolset" (snort, base, barnyard2, mysql, oinkmaster) that was a wonderful journey. :-)
What I did is already ready here as well in one image:
http://www.securixlive.com/securix-nsm/index.php

Tested with Virtualbox, great tools are packed here and this is up-t

[ more ]  [ reply ]
Fingerprinting IDS sensors? 2009-06-08
Chen, Hao (chenhao927 gmail com) (4 replies)
Hi,

I'm wondering if it is possible for an attacker to know/aware that a
target site has already had IDS products deployed? If yes, how? An
example would help, Thanks a lot!

Regards

[ more ]  [ reply ]
Re: Fingerprinting IDS sensors? 2009-06-08
Ron Gula (rgula tenablesecurity com) (1 replies)
Re: Fingerprinting IDS sensors? 2009-06-09
Stephen Mullins (steve mullins work gmail com)
RE: Fingerprinting IDS sensors? 2009-06-08
Ondrej Krehel (OKrehel StrozFriedberg com)
Re: Fingerprinting IDS sensors? 2009-06-08
Jeremy Bennett (jeremyfb mac com)
Re: Fingerprinting IDS sensors? 2009-06-08
Jamie Riden (jamie riden gmail com)
Automatic generation and Analysis of NIDS Attacks 2009-05-28
caglar (caglar ulakbim gov tr)
Dear all,

I am looking for a tool like AGENT to test my NIDS like:
http://pages.cs.wisc.edu/~shai/agent.html and it should also generate
attack traffic packets. I'd appreciate for any kind of help.

Sincerely

--
=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=
Caglar Gulcehre
TUBITAK - ULAKBIM
Phone: +90 312

[ more ]  [ reply ]
Announcing Realeyes IDS 0.9.5 2009-05-26
jjs_ritasa verizon net
The latest release of the Realeyes IDS (http://realeyes.sourceforge.net/) has been loaded on SourceForge. See the download page (http://realeyes.sourceforge.net/download.html) for information on downloading and installing it.

The Realeyes IDS captures and analyzes full sessions. The graphical us

[ more ]  [ reply ]
AW: Need help/info 2009-05-26
Daniel, Akos (a daniel drillisch-telecom de)
Hi,

It is the same for me. I need to plan and deploy an IPS/IDS system for our hup-spoke sites.
But I think I may not spend any time with self installed free product.
Till I setup basic things required for IPS:
- Event Correlation
- Alert Setup
- Some/default Reports
- Automatic updates (1. Signatu

[ more ]  [ reply ]
Need help/info 2009-05-20
ubernewbie (duppyconqueror33 gmail com) (4 replies)

I work for a small company with a hub/spoke network. I've been tasked with
setting up an IDS(Snort) to begin monitoring security related events and
basically build out a security program/infrastructure. Do any of you have
any good sites/forums that go into the process of intrusion detection. I can

[ more ]  [ reply ]
Re: Need help/info 2009-05-25
Joel Esler (eslerj gmail com)
Re: Need help/info 2009-05-25
Richard Bejtlich (taosecurity gmail com) (1 replies)
Re: Need help/info 2009-05-26
Stephen Mullins (steve mullins work gmail com)
Re: Need help/info 2009-05-23
Stephen Mullins (steve mullins work gmail com) (2 replies)
Re: Need help/info 2009-05-25
Fossett, Jeff S (Fossett Jeff con-way com)
Re: Need help/info 2009-05-25
Tyrel McMahan (tyrel tyrel pl)
Re: Need help/info 2009-05-21
Alexandros Papadopoulos (apapadop alumni cmu edu)
Workshop on the Analysis of System Logs (WASL) 2009 2009-05-20
Greg Bronevetsky (greg bronevetsky com)
Workshop on the Analysis of System Logs (WASL) 2009
http://www.systemloganalysis.com
Call for Papers

===============================
October 14, 2009
Big Sky, MT

[ more ]  [ reply ]
(Page 9 of 199)  < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus