HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Presentation of some free software for intrusion detection
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Presentation of some free software for intrusion detection  
> Access to the content HTML Beginning of the presentation  
> Description  
> Context & Dates Lecture made during a technical day on computer security devoted to intrusion detection organised by the CSIESR (Comité des Services Informatiques de l'Enseignement Supérieur et de la Recherche), on 26 January 2000.
 
> Author Stéphane Aubert 
> Type 27 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Idée
Plan
Intégrité d'un serveur : Tripwire...
Description de Tripwire
Fonctionnement de Tripwire
Configuration de Tripwire
Résultat de Tripwire
Surveillance des journaux : LogSurfer...
Présentation de LogSurfer
Principe de fonctionnement de LogSurfer
Configuration de LogSurfer
Détection d'intrusion réseau : Snort...
Description de Snort
Fonctionnalités de Snort
Écriture des règles Snort
Résultat de Snort
Résultat avec copie des paquets
Futures versions de Snort
Information sur Snort
Utilisation avancée de Firewall-1 : alert.sh...
Méthode Lance Spitzner
Fonctionnement du script alert.sh
Fonction Block de alert.sh
Idée
Quelques produits libres
Questions...  
> Related documents
themeIntrusion Detection
[Tip]  Argus [19 February 2002 - French/English]
[Course]  Advanced Intrusion Detection
[Presentation]  Encrypting hostile Web content over HTTP [31 May 2007 - French]
[Presentation]  Intrusion Prevention : New reinforcement tools for perimetric defense [16 June 2005 - French]
[Presentation]  Generation of regular expressions from logged events [2 February 2005 - French]
[Presentation]  Intrusion detection and network forensic [6 May 2004 - French]
[Presentation]  Intrusion Detection [25 September 2002 - French]
[Tip]  Advanced Intrusion Detection Environment (AIDE) [9 January 2002 - French]
[Tip]  Follow-up on discovering the libnids [6 September 2001 - French]
[Tip]  Introduction to the libnids [13 April 2001 - French]
[Tool]  rkscan tool [Rootkit scanner for loadable kernel-module rootkits - English]
[Tip]  RKSCAN: Scanner for loadable kernel-module rootkits [25 October 2000 - English]
[Tip]  Presentation and detection of the ADORE rootkit [16 October 2000 - French]
[Tool]  IDSwakeup tool [Test of intrusion detection systems - English]
[Presentation]  Round table on intrusion detection [8 June 2000 - French]
[Presentation]  Technical method to evade intrusion detection system. [27 March 2000 - French]
[Presentation]  Help to detect attack, intrusion and anomaly. [27 March 2000 - French]
[Presentation]  Introduction to intrusion detection [26 January 2000 - French]
[Presentation]  Intrusion detection with Shadow [6 July 1999 - French]
> Copyright © 2000, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 17 April 2002 at 17:18:17 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants