DeepSec 2011: Advances in IDS and Suricata
Speakers: Victor Julien | Eric Leblond
Victor Julien and Eric Leblond give you new information on the state of intrusion detection systems by talking about the Suricata IDS engine. This presentation gives you an update on the new things in Suricata, the next-gen IDS engine! Suricata is being developed by the Open Information Security Foundation (OISF) and has been released with a stable version in July 2010.
This talk has been held at the DeepSec 2011 security conference.
For more information visit: http://bit.ly/DeepSec2011_information
To download the video visit: http://bit.ly/DeepSec2011_videos
Playlist DeepSec 2011: http://bit.ly/DeepSec2011_playlist
Видео DeepSec 2011: Advances in IDS and Suricata канала Christiaan008
Victor Julien and Eric Leblond give you new information on the state of intrusion detection systems by talking about the Suricata IDS engine. This presentation gives you an update on the new things in Suricata, the next-gen IDS engine! Suricata is being developed by the Open Information Security Foundation (OISF) and has been released with a stable version in July 2010.
This talk has been held at the DeepSec 2011 security conference.
For more information visit: http://bit.ly/DeepSec2011_information
To download the video visit: http://bit.ly/DeepSec2011_videos
Playlist DeepSec 2011: http://bit.ly/DeepSec2011_playlist
Видео DeepSec 2011: Advances in IDS and Suricata канала Christiaan008
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
DEFCON 17: "Smart" Parking Meter Implementations, Globalism, and YouDEFCON 15: Multipot: A More Potent Variant of Evil TwinBlack Hat USA 2010: Network Stream Debugging with Mallory 4/5DEFCON 19: Network Application Firewalls: Exploits and Defense ( w speaker)CIC Collaboration Project26C3: Blackbox JTAG Reverse Engineering 1/6Black Hat USA 2010: Code Reuse/Return Oriented Programming in PHP Application Exploits 1/527c3: International Cyber Jurisdiction (en)Black Hat USA 2010: Hacking Browser's DOM: Exploiting Ajax and RIA 3/6DEFCON 19: From Printer To Pwnd: Leveraging Multifunction Printers During Penetration TestingDEFCON 19: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP (w speaker)30C3: Making machines that make (EN)OWASP AppSecUSA 2012: The Same-Origin SagaOWASP AppSec 2010: OWASP Top 10 2010 1/3Black Hat USA 2010: Semiconductor Security Awareness, Today and Yesterday 6/6DEFCON 16: Forensics is ONLY for Private Investigators27c3: How the Internet sees you (en)DeepSec 2011: Extending Scapy by a GSM Air Interface and Validating the ImplementationCIC News 11-01-2014: Target Data Breach Affected 70M | Fake AV served to Dailymotion visitorsCIC News 06-01-2014: NSA installing spyware | Hackers empty ATM | Botnet code creator jailedDEFCON 19: Bit-squatting: DNS Hijacking Without Exploitation