english deutsch
ACID (Analysis Console for Intrusion Databases)
Powerful PHP-based data analysis tool for network security events captured by many common IDS tools, including snort and tcpdump.
Advanced Intrusion Detection Environment
AIDE is a file integrity checker that supports regular expressions. Licensed with GPL.
Chkrootkit
Provides open source application to check for presence of rootkits installed on Linux/Unix machines. Links to security related sites.
Firestorm Network Intrusion Detection System
Firestorm is a high-performance GPL-licensed network intrusion detection system (NIDS). Features include being fully pluggable, easily configurable, and an extremely scalable signature engine.
Honeyd
Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet or for network monitoring. For *BSD, GNU/Linux, and Solaris.
Idsa
Experimental intrusion detection system and reference monitor designed to run at application level. For Linux. GPL/LGPL.
LAk Intrusion Prevention System
A single compilation of source, binaries, scripts and whitepapers on intrusion prevention systems. The aim is to quickly establish a working IPS within minutes.
LIDS Project - Secure Linux System
LIDS is an enhancement for the Linux kernel written by Xie Huagang and Philippe Biondi. It implements several security features that are not in the Linux kernel natively. Some of these include: mandatory access controls (MAC), a port scan detector, file protection (even from root), and process protection.
myNetWatchman.com
Intrusion Reporting and Response. Users forward firewall logs that are aggregated and analysed to identify incidents that are reported to the responsible party.
Open-Source IDS
A complete intrusion detection system created with well known open-source tools. Implemented using a custom RedHat 7.2 distribution and available for download as a stand-alone ISO image.
Panoptis
Network-IDS that detects and stops DoS/DDoS attacks by using real-time Cisco NetFlow data.
Passive OS Fingerprinting (pOf)
An advanced passive OS/network fingerprinting utility for use in IDS environments, honeypots environments, firewalls and servers.
Prelude hybride opensource IDS
Prelude is a new innovative hybrid Intrusion Detection system designed to be very modular, distributed, rock solid and fast.
QuIDScor IDS/VA correlation
QuIDScor is an Open Source project demonstrating the value in correlating information between Intrusion Detection Systems (such as Snort) and vulnerability assesment and management platforms such as QualysGuard.
Rootkit Hunter
Open-source GPL rootkit scanner for Unix-like systems. Scans for rootkits, trojans, backdoors and local exploits. Tests include scanning of plaintext and binary files for MD5 hash comparisons, default rootkit files, binary permissions, suspect LKM/KLD module strings, and hidden files.
Shadow Intrusion and Network Analysis
Shadow is an intrusion-detection system from the Naval Surface Warfare Center, shows promise in detecting previously unknown attacks for which no known detection signatures exist.
sLink project
sLink consists of a daemon and a suite of cgi programs which provide a web administration interface to an EDM/BOSCH Solution16 Alarm Panel.
Snort
A free lightweight network intrusion detection system for UNIX and Windows.
Snortalog
Perl-based log analysis tool that summarizes network security events from any native snort database format.
Systrace (Interactive Policy Generation for System
Systrace enforces system call policies for applications by interactively constraining the application's access to the system (*bsd and linux). Systrace is able to monitor daemons on remote machines and generate warnings at a central location.
The Osiris Scripts
A tripwire-like utility which uses MD5 to check files for modifications.
Virtual eXecuting Environment
VXE is an open source Intrusion Prevention System intended to protect Unix subsystems (daemon protection) from known and unknown network intrusion threats.