Downloadliste

Projektbeschreibung

The Port Scan Attack Detector (psad) is a collection of three system daemons that are designed to work with the Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults), verbose alert messages, email alerting, DShield reporting, and automatic blocking of offending IP addresses. Psad incorporates many of the packet signatures included in Snort to detect various kinds of suspicious scans, and implements the same passive OS fingerprinting algorithm used by p0f.

Systemanforderungen

Die Systemvoraussetzungen sind nicht definiert
Information regarding Project Releases and Project Resources. Note that the information here is a quote from Freecode.com page, and the downloads themselves may not be hosted on OSDN.

2008-08-22 23:14 Zurück zur Release-Liste
2.1.4

Diese Pressemitteilung restrukturiert Perl-Modul Wege, um es einfach zu einem "nodeps Einführung der" Verteilung der psad nicht enthält, Perl-Module. Dies ermöglicht eine bessere Integration mit Systemen, die bereits alle erforderlichen Module installiert (einschließlich der IPTables:: ChainMgr und IPTables: : Parse Module). Die wichtigsten Treiber für diese Arbeit ist es, alle cipherdyne.org Projekte problemlos mit der Debian-basierten Distributionen integriert. Ein Bugfix wurde, um die Variable in IPT_SYSLOG_FILE - Analyse-Mitteil-Modus zu ehren. Ein Schalter wurde aus dem veraltet Blutungen aus all.rules-Datei, um die neu entstehenden-all.rules vor neuen Bedrohungen zur Verfügung.
Tags: Minor feature enhancements
This release restructures Perl module paths to
make it easy to introduce
a "nodeps" distribution of psad that does not
contain any Perl modules.
This allows better integration with systems that
already have all
necessary modules installed (including the
IPTables::ChainMgr and
IPTables::Parse modules). The main driver for this
work is to make all
cipherdyne.org projects easily integrated with
distributions based on
Debian. A bugfix has been made to honor the
IPT_SYSLOG_FILE variable
in --Analyze-msgs mode. A switch has been made
from the deprecated
bleeding-all.rules file to the new
emerging-all.rules available from
Emerging Threats.

Project Resources