Category Archives: Intrusion Prevention Systems

Network intrusion detection snort rules writing tutorial overview – Cyber Security Video

Overview of writing snort rules and the importance of writing strong effective ones

Share Button

Snort IDS Intrusion Detection System RULE SIGNATURE writing overview howto – Cyber Security Videos

Several examples of Snort rule creation and triggered alerts. 4:22 – Adding custom rules to Snort configuration 4:47 – Create custom rules file 5:40 – FTP alert rule 14:57 – Manually running Snort 17:53 – FTP alert generated 19:12 – Keyword alert rule 25:24 – Keyword alert generated 26:28 – ICMP alert rule 28:56 –… Read More »

Share Button

Snort IDS Intrusion Detection Overview (Corkys-Security-Series) – Cyber Security Videos

Brief overview of what Snort is and how it works for beginners, next videos will cover rule writing, etc  

Share Button

Suricata Intrusion Detection System on Ubuntu – No Voice – Cyber Security Video

Compilation of suricata from source Configuration of suricata to detect jpeg images (by using libmagic1) Test of the filestore capability of Suricata  

Share Button

Why Choose BRO Open Source Network Security Platform IDS/IPS Solution? Cyber Security Video

Bro is an open-source network security platform that illuminates your network’s activity in detail, with the stability and flexibility for production deployment at scale. 1 Powerful analysis, elegant design Bro reduces incoming packet streams into higher-level events and applies customizable scripts to determine the necessary course of action. This simple design allows you to configure… Read More »

Share Button