OpenSource NIDS Snort: Snort is an OpenSource networkbased IDS. It analyses network traffic in realtime. Alerts are generated based on signatures and protocol analysis. Snort is available for many operating systems, including Linux, BSD, Solaris and Windows. The name "Snort" is a Trademark of Sourcefire, INC. Snort GUIs and analysis tools:
Snort spoolers:
Snort-based alert generators:
Snort performance improvement:
Snort plugins:
Snort rules lookup databases:
Bleeding Snort Ruleset: a set of "bleeding edge" Snort rules The Snort Wireless Project is alive again and ready for snort 2.1.1 with the help of Sebastien Gracia. NetSQUID: gathers alerts generated by Snort, then automatically creates an IPTables firewall entry to block the alerting host Oinkmaster: The de-facto standard update-Tool for Snort Signatures logtopcap: converts Snort unified log files to pcap files Brian Caswell and Jeff Nathan published their new Snort preprocessor sp_perl. It allows regexp matching and runtime execution of perl code. The presentation slides from CanSecWest are also available. New snort patch for IDS alert verification: the tool triggers NASL (Nessus Attack Scripting Language) scripts to check an attacked host for real vulnerabilities. Seems to be somewhat dubious for enterprise environments, but hey, it's at least a new idea which has to be tested. Other (non-Snort-based) OpenSource NIDS:
OpenSource HIDS: SNARE - System Intrusion Analysis & Reporting Environment Improves Linux with hostbased IDS and C2-style auditing. Samhain: a distributed file integrity checker Basically, Samhain is a System Integrity Verifier. Then why not group it under SIV? Samhain has much more features than a simple hash database. Samhain allows distributed file checking with a central database. It runs in daemon mode and knows about previous alert, so it will not raise the same alert again. On Linux and FreeBSD systems Samhain detects LKM (loadable kernel module) rootkits. With the web based console Belthane it is easy to update the signature database on the central server and to monitor the change logs. M-ICE: (Modular Intrusion Detection and Countermeasure Environment) OpenSource Hybrid IDS: Prelude combines hostbased and networkbased IDS in one system. While it is a relatively young system it seems to evolve quite nicely. In my opinion a very promising project. See also Preludes new honeyd patch. Tripwire: the well-known commercial system has a somewhat old OpenSource brother Aide (Advanced Intrusion Detection Environment): a Tripwire replacement Samhain: see above Inline-Snort: a patch for Snort which enables Snort to drop or modify network packets Hogwash: an IPS which was formerly based on Snort. The new H2 engine will replace the Snort engine. (seems no longer to be actively maintained) Miscellaneous Tools: fragroute: an attack router which implements NIDS evasion techniques after the famous Ptacek/Newsham paper "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection ". NADS (Normalized Attack Detection System):a C library to normalizes HTTP urls (currently proof-of-concept code) |
Visite também:
BR-Linux ·
VivaOLinux ·
LinuxSecurity ·
Dicas-L ·
NoticiasLinux ·
SoftwareLivre.org ·
[mais]
IDS Tools
Assinar:
Postagens (Atom)