Using Open BSD, snort, Linux, and a few other tricks to set up a transparent, ACTIVE Ids.

Presented at DEF CON 9 (2001), July 14, 2001, 4 p.m. (110 minutes)

Basically I will cover: How to set up Snort Sensor in Openbsd. - How to use Perl & Rules to actively adapt rules to attacks, while keeping yourself from being "DOSSED" - How to use ACID to make logs more easily accessible, and analyzed, - How to Use database portion to look at historical attack trends and react appropriately. - How to set up "safe" management segment on your network that is both accessible to you, but hard for "them" to get into.

Presenters:

Links:

Similar Presentations: