Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil’s main component is an intuitive GUI that provides access to realtime events, session data, and raw packet captures. Sguil facilitates the practice of Network Security Monitoring and event driven analysis. The Sguil client is written in tcl/tk and can be run …
Tag: intrusion detection
Permanent link to this article: https://www.darknessgate.com/2015/03/06/sguil/
CAINE (Computer Aided INvestigative Environment)
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims …
Permanent link to this article: https://www.darknessgate.com/2015/01/24/caine-computer-aided-investigative-environment/
Cryptography
This class teaches the theory, foundations and applications of modern cryptography. In particular, we treat cryptography from a complexity-theoretic viewpoint. In recent years, researchers have found many practical applications for these theoretical results, and so we will also discuss their impact along the way and how one may use the theory to design secure systems. …
Permanent link to this article: https://www.darknessgate.com/2014/09/30/cryptography/
Performance Issues in High Speed Networks
The purpose of this course is to introduce graduate students to networking research. The first part of the course (about 67%) provides an introduction to the Internet and the basic methodologies of computer systems performance evaluation, including a detailed discussion of Internet protocols and applications, wired and wireless networking technologies, and networking research paradigms. The …
Permanent link to this article: https://www.darknessgate.com/2014/09/26/performance-issues-high-speed-networks/
Security and Cryptography (CSS 322)
This course aims to introduce you to the principles and techniques of securing computers and computer networks, with focus on Internet security. The course is effectively split into two parts: first introducing the theory of cryptography, including how many classical and popular algorithms work (e.g. DES, RSA, digital signatures); and second providing details of real …
Permanent link to this article: https://www.darknessgate.com/2014/09/04/security-cryptography-css-322/
Computer Networks and Security (2IC60)
At the end of the course, students are expected to be able to explain how computer networks are organized. describe the Internet structure and explain how standard problems are solved in that context. analyze simple protocols with respect to correctness, performance, reliability and security. recognize and describe security requirements of networking scenarios identify security technologies …
Permanent link to this article: https://www.darknessgate.com/2014/08/20/computer-networks-security-2ic60/
Capsa Free
Capsa Free is a must-have freeware network analyzer for Ethernet monitoring, troubleshooting and analysis. It provides users with great experience to learn how to monitor network activities, pinpoint network problems, enhance network security and so on. Moreover, Capsa Free is a perfect choice for students, teachers and computer geeks to learn protocols and networking technology …
Permanent link to this article: https://www.darknessgate.com/2014/06/06/capsa-free/
The Dude
The Dude network monitor is a new application by MikroTik which can dramatically improve the way you manage your network environment. It will automatically scan all devices within specified subnets, draw and layout a map of your networks, monitor services of your devices and alert you in case some service has problems. Features: The Dude …
Permanent link to this article: https://www.darknessgate.com/2014/06/06/the-dude/
Microsoft Network Monitor 3.4
Network Monitor 3.4 is a protocol analyzer. It allows you to capture network traffic and view and analyze it. Supported Operating System Windows 7, Windows 8, Windows Server 2003 Service Pack 2, Windows Server 2003 Service Pack 2 x64 Edition, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 for Itanium-based Systems, Windows …
Permanent link to this article: https://www.darknessgate.com/2014/06/05/microsoft-network-monitor-3-4/
Microsoft Message Analyzer
Microsoft Message Analyzer is a new tool for capturing, displaying, and analyzing protocol messaging traffic and other system messages. Message Analyzer also enables you to import, aggregate, and analyze data from log and trace files. It is the successor to Microsoft Network Monitor 3.4 and a key component in the Protocol Engineering Framework (PEF) that …
Permanent link to this article: https://www.darknessgate.com/2014/06/05/microsoft-message-analyzer/
Intrusion detection Course From the University of Korea
The purpose of this class is to introduce traditional intrusion detection (type – NIDS, HIDS and hybrid IDS. method – misuse detection and anomaly detection) and advanced issues (lifecycle of vulnerability, concept of attack graph, recent anomaly detection technique). This course is for introducing recent advanced issues in the intrusion detection research area. The most …
Permanent link to this article: https://www.darknessgate.com/2013/02/21/intrusion-detection-course-from-the-university-of-korea/