skip to main content
10.5555/1039834.1039864guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Snort - Lightweight Intrusion Detection for Networks

Published: 12 November 1999 Publication History

Abstract

Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Commercial NIDS have many differences, but Information Systems departments must face the commonalities that they share such as significant system footprint, complex deployment and high monetary cost. Snort was designed to address these issues.

References

[1]
{SHD98} SHADOW, Steven Northcutt et al., Naval Surface Warfare Center Dahlgren Laboratory, 1998, http://www.nswc.navy.mil/ISSEC/CID/.]]
[2]
{TCPD91} tcpdump, Van Jacobson, Craig Leres and Steven McCanne, Lawrence Berkeley National Laboratory, 1991, http://www-nrg.ee.lbl.gov/.]]
[3]
{PCAP94} libpcap, Van Jacobson, Craig Leres and Steven McCanne, Lawrence Berkeley National Laboratory, 1994, http://www-nrg.ee.lbl.gov/.]]
[4]
{DTK98} Deception Toolkit, Fred Cohen & Associates, 1998, http://all.net/dtk/dtk.html.]]
[5]
{GNU89} GNU General Public License, Richard Stallman, 1989, http://www.gnu.org/copyleft/gpl.txt.]]
[6]
{BPF93} "The BSD Packet Filter: A New Architecture for User-level Packet Capture," Steven McCanne, Van Jacobson, USENIX Technical Conference Proceedings, 1993.]]
[7]
{ALE96} "Smashing the Stack for Fun and Profit," Aleph1, Phrack #49, 1996, http://www.phrack.com.]]
[8]
{BTQ99} Bugtraq Mailing List, archives and vulnerability data base are available at Security Focus, http://www.securityfocus.com.]]
[9]
{IISBT99} "NT IIS Showcode ASP Vulnerability," Bugtraq ID #167, Parcens/L0pht, May, 1999, http://www.securityfocus.com.]]
[10]
{OSS98} The Cathedral and the Bazaar, Eric S. Raymond, 1998, http://www.tuxedo.org/~esr/writings/cathedral-bazaar/.]]
[11]
{FYD97} "The Art of Port Scanning," Fyodor, Phrack #51, 1997, http://www.insecure.org/nmap/p51-11.txt.]]
[12]
{SWT92} "Centralized System Monitoring With Swatch," Stephen E. Hansen and E. Todd Atkins, USENIX Seventh Systems Administration Conference, 1993, http://www.stanford.edu/~atkins/swatch/lisa93.html.]]
[13]
{SEDG97} Algorithms in C: Fundamentals, Data Structures, Sorting, Searching, Robert Sedgewick, Addison-Wesely Publishing Company, 1997.]]
[14]
{IRDP99} L0pht Security Advisory, Silicosis and Mudge, August 1999, http://www.l0pht.com/advisories/rdp.txt.]]
[15]
{ALMN99} Sendmail, Eric Allman, 1999 http://www.sendmail.com.]]
[16]
{PTA98} Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Thomas Ptacek and Timothy Newsham, Secure Networks Inc, 1998, http://www.nai.com/services/support/whitepapers/security/IDSpaper.pdf.]]
[17]
{MJR99} Burglar Alarms for Detecting Intrusions, Marcus Ranum, NFR Inc, 1999, http://www.blackhat.com/html/bh-usa-99/bh3-speakers.html.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
LISA '99: Proceedings of the 13th USENIX conference on System administration
November 1999
309 pages

Publisher

USENIX Association

United States

Publication History

Published: 12 November 1999

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media