DShield

DShield

DShield is a community-based collaborative firewall log correlation system. It receives logs from volunteers world wide and uses them to analyze attack trends. It is used as the data collection engine behind the SANS Internet Storm Center (ISC). It was officially launched end of November 2000 by Johannes Ullrich. Since then, it has grown to be a dominating attack correlation engine with worldwide coverage.

DShield is regularly used by the media to cover current events. Analysis provided by DShield has been used in the early detection of several worms, like "Ramen", Code Red, "Leaves", "SQL Snake" and more. DShield data is regularly used by researchers to analyze attack patterns.

The goal of the DShield project is to allow access to its correlated information to the public at no charge to raise awareness and provide accurate and current snapshots of internet attacks. Several data feeds are provided to users to either include in their own web sites or to use as an aide to analyze events.

See also

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • DShield — Saltar a navegación, búsqueda DShield es un sistema de correlación de logs de firewall basado en la comunidad. Recibe logs de voluntarios por todo el mundo y los usa para analizar tendencias de ataque. Se usa como el motor de recolección de datos …   Wikipedia Español

  • Internet Storm Center — The Internet Storm Center (ISC) is a program of the SANS Institute which monitors the level of malicious activity on the Internet, particularly with regards to large scale infrastructure events. The ISC evolved from Incidents.org , a site… …   Wikipedia

  • Johannes Ullrich — is the founder of DShield. DShield is now part of the SANS Internet Storm Center which he leads since it was created from Incidents.org and DShield back in 2001. In 2005, he was named one of the 50 most powerful people in Networking by Network… …   Wikipedia

  • Internet Storm Center — Das Internet Storm Center (ISC) ist ein Programm des mit Computersicherheit befassten SANS Instituts, das die Anzahl bösartiger/schädlicher Aktivitäten im Internet überwacht. Das ISC entwickelte sich aus der Website „Incidents.org“, eine… …   Deutsch Wikipedia

  • Salt (cryptography) — In cryptography, a salt consists of random bits, creating one of the inputs to a one way function. The other input is usually a password or passphrase. The output of the one way function can be stored rather than the password, and still be used… …   Wikipedia

  • ANI (file format) — Infobox file format name = ANI extension = .ani mime = owner = Microsoft genre = cursor graphics file format containerfor = containedby = extendedfrom = extendedto = The ANI file format is a graphics file format used for animated cursors on the… …   Wikipedia

  • Client honeypot — Honeypots are security devices whose value lie in being probed and compromised. Traditional honeypots are servers (or devices that expose server services) that wait passively to be attacked. Client Honeypots are active security devices in search… …   Wikipedia

  • MyNetWatchman — is a community based collaborative firewall log correlation system. It receives logs from volunteers world wide and uses them to analyze attack trends. The goal of the MyNetWatchman project is to allow access to its correlated information to the… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”