DShield

DShield

DShield

DShield es un sistema de correlación de logs de firewall basado en la comunidad. Recibe logs de voluntarios por todo el mundo y los usa para analizar tendencias de ataque. Se usa como el motor de recolección de datos tras el SANS Internet Storm Center (ISC). Se lanzó oficialmente al final de noviembre de 2000 por parte de Johannes Ullrich. Desde entonces, ha crecido para ser el motor de correlación de ataques dominante con cobertura mundial.

DShield es utilizado regularmente por los medios para cubrir eventos actuales. El análisis proporcionado por DShield ha sido usado en la detección temprana de diversos gusanos, como "Ramen", Code Red, "Leaves", "SQL Snake" y otros. La información de DShield la usan regularmente los investigadores para analizar patrones de ataque.

La meta del proyecto DShield es permitir el acceso a su información correlada al público sin ningún cargo para concienciar y proporcionar instantáneas precisas y actuales de los ataques en internet. Se ofrecen a los usuarios diversas fuentes de datos que pueden incluir en sus sitios web o usarlas como una ayuda para analizar eventos.

Enlaces externos

Obtenido de "DShield"

Wikimedia foundation. 2010.

Игры ⚽ Нужен реферат?

Mira otros diccionarios:

  • DShield — is a community based collaborative firewall log correlation system. It receives logs from volunteers world wide and uses them to analyze attack trends. It is used as the data collection engine behind the SANS Internet Storm Center (ISC). It was… …   Wikipedia

  • Internet Storm Center — The Internet Storm Center (ISC) is a program of the SANS Institute which monitors the level of malicious activity on the Internet, particularly with regards to large scale infrastructure events. The ISC evolved from Incidents.org , a site… …   Wikipedia

  • Johannes Ullrich — is the founder of DShield. DShield is now part of the SANS Internet Storm Center which he leads since it was created from Incidents.org and DShield back in 2001. In 2005, he was named one of the 50 most powerful people in Networking by Network… …   Wikipedia

  • Internet Storm Center — Das Internet Storm Center (ISC) ist ein Programm des mit Computersicherheit befassten SANS Instituts, das die Anzahl bösartiger/schädlicher Aktivitäten im Internet überwacht. Das ISC entwickelte sich aus der Website „Incidents.org“, eine… …   Deutsch Wikipedia

  • Salt (cryptography) — In cryptography, a salt consists of random bits, creating one of the inputs to a one way function. The other input is usually a password or passphrase. The output of the one way function can be stored rather than the password, and still be used… …   Wikipedia

  • ANI (file format) — Infobox file format name = ANI extension = .ani mime = owner = Microsoft genre = cursor graphics file format containerfor = containedby = extendedfrom = extendedto = The ANI file format is a graphics file format used for animated cursors on the… …   Wikipedia

  • Client honeypot — Honeypots are security devices whose value lie in being probed and compromised. Traditional honeypots are servers (or devices that expose server services) that wait passively to be attacked. Client Honeypots are active security devices in search… …   Wikipedia

  • MyNetWatchman — is a community based collaborative firewall log correlation system. It receives logs from volunteers world wide and uses them to analyze attack trends. The goal of the MyNetWatchman project is to allow access to its correlated information to the… …   Wikipedia

Compartir el artículo y extractos

Link directo
Do a right-click on the link above
and select “Copy Link”