Welcome![Sign In][Sign Up]
Location:
Search - INTRUSION PREVENTION

Search list

[Internet-Networkcode

Description: 自己写的入侵检测源码,用于防范缓冲区溢出。其中toto.c和exe_pro.c是一个例子-Intrusion Detection write their own source for the prevention of buffer overflow. Toto.c and exe_pro.c which is an example
Platform: | Size: 7168 | Author: 齐巍 | Hits:

[Internet-NetworkSnort

Description: 该文件详细介绍了snort的用法,snort是一个很好用的入侵检测系统。snort有三种工作模式:嗅探器、数据包记录器、网络入侵检测系统。-The open source Snort Intrusion Detection and Prevention system is the most flexible and widely deployed solution available
Platform: | Size: 28672 | Author: 邓平 | Hits:

[Internet-Networkhacker

Description: 黑客编程源码,比较简单,希望对大家有帮助-Programming hacking code, relatively simple, we want to help
Platform: | Size: 4096 | Author: liudong | Hits:

[Internet-Network3-Snort

Description: Snort is a network intrusion detection and prevention system. It is the most widely deployed technology of its kind in the world
Platform: | Size: 7284736 | Author: 张宝军 | Hits:

[Otherfanheijingying

Description: 反黑精英之入侵防御,分一二三章,为PDF格式,提供一些基础教程。-Triad elite intrusion prevention, sub-123 chapters, as PDF format, to provide some basic tutorials.
Platform: | Size: 1046528 | Author: 苏媛 | Hits:

[Otherrainhips2.05Src

Description: 禹盾2.05源码.禹盾hips是一款绿色的主机入侵防御系统,它从驱动层保护系统关键位置,拦截进程,注册表,驱动 等危险操作,从而达到保护电脑的目标,即使是未知病毒,一样能够99 拦截. -Yu Shield 2.05 source code. Yu is a green shield hips host intrusion prevention system, which protect the system from the driver layer key positions, block the process, registry, drivers and other dangerous operations, so as to achieve the goal to protect your computer, even unknown viruses, be able to intercept 99 of the same.
Platform: | Size: 1287168 | Author: 阿东 | Hits:

[Windows DevelopProtectbo

Description: 防止电脑被BO入侵的代码,对于开发防入侵入侵检测类程序有一定帮助。-To prevent the invasion of computers have been BO code, for the development of intrusion detection intrusion prevention type programs have some support.
Platform: | Size: 55296 | Author: lihui | Hits:

[Internet-Networksnort_2.2

Description: Snort已发展成为一个多平台(Multi-Platform),实时(Real-Time)流量分析,网络IP数据包(Pocket)记录等特性的强大的网络入侵检测/防御系统(Network Intrusion Detection/Prevention System),即NIDS/NIPS.Snort符合通用公共许可(GPL——GUN General Pubic License),在网上可以通过免费下载获得Snort,并且只需要几分钟就可以安装并开始使用它.snort基于libpcap.-snort
Platform: | Size: 1429504 | Author: 杨强强 | Hits:

[SCMDataMiningTechniquesfor(Network)Intrusion

Description: In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In this paper, we are mostly focused on data mining techniques that are being used for such purposes. We debate on the advantages and disadvantages of these techniques. Finally we present a new idea on how data mining can aid IDSs.
Platform: | Size: 372736 | Author: keerthi | Hits:

[Otherhack

Description: 扫描和反扫描,密码破解,基于漏洞的入侵和防范。本书介绍了黑客的一些知识。让神秘的黑客不在神秘!-Scanning and anti-scanning, password cracking, vulnerability-based intrusion and prevention. This book presents some knowledge of hackers. Hackers are not so mysterious mystery!
Platform: | Size: 19692544 | Author: wuzj | Hits:

[Windows Developadodb511

Description: IDS入侵检测系统的安装和部署,一款用于Windows平台下的软件。-Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire.
Platform: | Size: 693248 | Author: gram | Hits:

[OtherHKGFSZJSWQSC_pdf

Description: 黑客攻防实战技术完全手册:扫描、嗅探、入侵与防御-Technology is completely offensive and defensive combat hackers Manual: scanning, sniffing, and intrusion prevention
Platform: | Size: 19996672 | Author: jinliang | Hits:

[AI-NN-PRScript-based-Gigabit-Intrusion-Prevention-Model-o-

Description: 基于脚本的千兆位入侵防御开放模型研究Script-based Gigabit Intrusion Prevention Model of Open-Script-based Gigabit Intrusion Prevention Model of Open
Platform: | Size: 247808 | Author: tec1234 | Hits:

[Internet-Networkdefend

Description: 入侵防御白皮书,爱好网络安全编程的朋友必备-Intrusion Prevention White Paper, loving friend of essential network security programming
Platform: | Size: 528384 | Author: 韩瑞 | Hits:

[Exploitprotocol

Description: 本文综合了IDS与IPS的特点,将协议分析、网络流量分析与深度包检测技术相结合,提出一个新的网络防御系统一“基于协议分析的网络分布式入侵防御系统(Network Distributed Intrusion Prevention System Base on the Protocol Analysis,NDIPS),同时给出了系统的基本实现,并利用现有仿真条件及网络基 础对部分检测防御技术进行了必要的评测与验证。该系统提高了网络对入侵的实 时阻止能力,提高了网络整体的安全性。-This combination of IDS and IPS features, the protocol analysis, network traffic analysis and deep packet inspection technology, to propose a new network defense system a " protocol analysis of network-based distributed intrusion prevention system (Network Distributed Intrusion Prevention System Base on the Protocol Analysis, NDIPS), also gives a basic implementation of the system and the simulation conditions and the use of existing network infrastructure technology for detection and prevention on the part of the necessary evaluation and verification. The system is to improve the network in real time to prevent the invasion ability of and improve overall network security.
Platform: | Size: 4255744 | Author: sdjgkj | Hits:

[Software Engineeringipc$-

Description: IPC$入侵全解,全名介绍如何利用空连接入侵电脑以及防范-IPC $ invade the whole solution, full name describes how the empty connected computer intrusion and prevention
Platform: | Size: 9216 | Author: rico | Hits:

[Internet-NetworkuClinux-2.4.0.0pre0.diff

Description: LINUX内核源码,用于配的LIDS安装linux入侵防御系统-LINUX kernel source, for distribution the LIDS to install linux Intrusion Prevention System
Platform: | Size: 365568 | Author: 曾龙 | Hits:

[Internet-Networklinux-2.4.28.tar.bz2

Description: linux内核2.4.28版本,配合安装linux入侵防御系统,下载去掉后缀名(.gz)-linux kernel version 2.4.28, with the installed linux intrusion prevention systems, download remove the suffix (. gz)
Platform: | Size: 31064064 | Author: 曾龙 | Hits:

[OS programidsr

Description: An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization.
Platform: | Size: 280576 | Author: Guru | Hits:

[Linux-Unixsuricata-3.1.2.tar

Description: 入侵检测和防御相关,真实suricata源码-Intrusion detection and prevention of related real suricata source
Platform: | Size: 3338240 | Author: | Hits:

CodeBus www.codebus.net