Description: 自己写的入侵检测源码,用于防范缓冲区溢出。其中toto.c和exe_pro.c是一个例子-Intrusion Detection write their own source for the prevention of buffer overflow. Toto.c and exe_pro.c which is an example Platform: |
Size: 7168 |
Author:齐巍 |
Hits:
Description: 该文件详细介绍了snort的用法,snort是一个很好用的入侵检测系统。snort有三种工作模式:嗅探器、数据包记录器、网络入侵检测系统。-The open source Snort Intrusion Detection and Prevention system is the most flexible and widely deployed solution available Platform: |
Size: 28672 |
Author:邓平 |
Hits:
Description: Snort is a network intrusion detection and prevention system. It is the most widely deployed technology of its kind in the world Platform: |
Size: 7284736 |
Author:张宝军 |
Hits:
Description: 反黑精英之入侵防御,分一二三章,为PDF格式,提供一些基础教程。-Triad elite intrusion prevention, sub-123 chapters, as PDF format, to provide some basic tutorials. Platform: |
Size: 1046528 |
Author:苏媛 |
Hits:
Description: 禹盾2.05源码.禹盾hips是一款绿色的主机入侵防御系统,它从驱动层保护系统关键位置,拦截进程,注册表,驱动 等危险操作,从而达到保护电脑的目标,即使是未知病毒,一样能够99 拦截.
-Yu Shield 2.05 source code. Yu is a green shield hips host intrusion prevention system, which protect the system from the driver layer key positions, block the process, registry, drivers and other dangerous operations, so as to achieve the goal to protect your computer, even unknown viruses, be able to intercept 99 of the same. Platform: |
Size: 1287168 |
Author:阿东 |
Hits:
Description: 防止电脑被BO入侵的代码,对于开发防入侵入侵检测类程序有一定帮助。-To prevent the invasion of computers have been BO code, for the development of intrusion detection intrusion prevention type programs have some support. Platform: |
Size: 55296 |
Author:lihui |
Hits:
Description: In Information Security, intrusion detection is the act
of detecting actions that attempt to compromise the confidentiality,
integrity or availability of a resource. Intrusion detection does not,
in general, include prevention of intrusions. In this paper, we are
mostly focused on data mining techniques that are being used for
such purposes. We debate on the advantages and disadvantages
of these techniques. Finally we present a new idea on how data
mining can aid IDSs. Platform: |
Size: 372736 |
Author:keerthi |
Hits:
Description: 扫描和反扫描,密码破解,基于漏洞的入侵和防范。本书介绍了黑客的一些知识。让神秘的黑客不在神秘!-Scanning and anti-scanning, password cracking, vulnerability-based intrusion and prevention. This book presents some knowledge of hackers. Hackers are not so mysterious mystery! Platform: |
Size: 19692544 |
Author:wuzj |
Hits:
Description: IDS入侵检测系统的安装和部署,一款用于Windows平台下的软件。-Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Platform: |
Size: 693248 |
Author:gram |
Hits:
Description: 基于脚本的千兆位入侵防御开放模型研究Script-based Gigabit Intrusion Prevention Model of Open-Script-based Gigabit Intrusion Prevention Model of Open Platform: |
Size: 247808 |
Author:tec1234 |
Hits:
Description: 本文综合了IDS与IPS的特点,将协议分析、网络流量分析与深度包检测技术相结合,提出一个新的网络防御系统一“基于协议分析的网络分布式入侵防御系统(Network Distributed Intrusion Prevention System Base on the Protocol
Analysis,NDIPS),同时给出了系统的基本实现,并利用现有仿真条件及网络基
础对部分检测防御技术进行了必要的评测与验证。该系统提高了网络对入侵的实
时阻止能力,提高了网络整体的安全性。-This combination of IDS and IPS features, the protocol analysis, network traffic analysis and deep packet inspection technology, to propose a new network defense system a " protocol analysis of network-based distributed intrusion prevention system (Network Distributed Intrusion Prevention System Base on the Protocol Analysis, NDIPS), also gives a basic implementation of the system and the simulation conditions and the use of existing network infrastructure technology for detection and prevention on the part of the necessary evaluation and verification. The system is to improve the network in real time to prevent the invasion ability of and improve overall network security. Platform: |
Size: 4255744 |
Author:sdjgkj |
Hits:
Description: IPC$入侵全解,全名介绍如何利用空连接入侵电脑以及防范-IPC $ invade the whole solution, full name describes how the empty connected computer intrusion and prevention Platform: |
Size: 9216 |
Author:rico |
Hits:
Description: LINUX内核源码,用于配的LIDS安装linux入侵防御系统-LINUX kernel source, for distribution the LIDS to install linux Intrusion Prevention System Platform: |
Size: 365568 |
Author:曾龙 |
Hits:
Description: An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization. Platform: |
Size: 280576 |
Author:Guru |
Hits: