Senin, 07 Januari 2008

Snort Report 12 Posted

My 12th Snort Report titled Snort Frequently Asked Questions is posted. From the start of the article:

Service provider takeaway: Snort isn't perfect. In this tip, service providers will learn the answers to frequently asked questions about Snort's usage and limitations.

In this edition of the Snort Report, I address some of the questions frequently asked by service providers who are users or potential users of Snort. I say "potential users" because some people hear about Snort and wonder if it can solve a particular problem. Here I hope to provide realistic expectations for service providers using Snort.


Again, please note I did not write the words "Snort isn't perfect." The editor did. This is one of the aspects of the Snort Report I do not control. In this article I address these questions.


  1. Can I use Snort to protect a network from denial-of-service attacks?

  2. Can Snort decode encrypted traffic?

  3. Can Snort detect layer 2 attacks?

  4. Can Snort log flows or sessions?

  5. Can Snort rebuild content from traffic?


If you like this article and have your own Snort questions, please post them here as comments. Thank you.

0 komentar:

Posting Komentar