DShield

DShield is a community-based collaborative firewall log correlation system.[2] It receives logs from volunteers worldwide and uses them to analyze attack trends. It is used as the data collection engine behind the SANS Internet Storm Center (ISC). DShield was officially launched end of November 2000 by Johannes Ullrich.[1] Since then, it has grown to be a dominating attack correlation engine with worldwide coverage.

DShield at the
SANS Internet Storm Center
OwnerJohannes Ullrich[1]
URLwww.dshield.org
Alexa rank dshield.org Traffic Statistics
Launched30 November 2000 (2000-11-30)

DShield is regularly used by the media to cover current events. Analysis provided by DShield has been used in the early detection of several worms, like "Ramen", Code Red, "Leaves", "SQL Snake" and more. DShield data is regularly used by researchers to analyze attack patterns.

The goal of the DShield project is to allow access to its correlated information to the public at no charge to raise awareness and provide accurate and current snapshots of internet attacks. Several data feeds are provided to users to either include in their own web sites or to use as an aide to analyze events.

See also

References

  1. Lemos, Robert (2000-12-06). "The Net's new neighbourhood watch". Networking. CBS Interactive. ZDNet. Retrieved 2020-04-04.
  2. Kaelin, Mark (2000-12-27). "Defending with DShield". TechRepublic. CBS Interactive. Retrieved 2020-04-04. When defending your network against crackers, knowledge is power. DShield.org helps net admins gain the knowledge they need to safeguard their companies.

Further reading

  • Holden, Greg (2007). "Part II, Chapter 6: Optimizing the Shopping Experience". Starting an Online Business For Dummies (Fifth ed.). Hoboken, NJ, USA: Wiley Publishing, Inc. p. 163. ISBN 9780470107393.
  • Rash, Michael (2007). Samuell, Christina (ed.). Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort. San Francisco, CA, USA: No Starch Press, Inc. / William Pollack. pp. 123-130. ISBN 1593271417.
  • Fung, Carol; Boutaba, Raouf (2017). "3.4 Selected Intrusion detection networks". Intrusion detection networks: a key to collaborative security. CRC Press. p. 30. ISBN 9781138198890. OCLC 1065286709.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.