head	1.1;
access;
symbols
	RELEASE_8_3_0:1.1
	RELEASE_9_0_0:1.1
	RELEASE_7_4_0:1.1
	RELEASE_8_2_0:1.1
	RELEASE_6_EOL:1.1
	RELEASE_8_1_0:1.1
	RELEASE_7_3_0:1.1
	RELEASE_8_0_0:1.1
	RELEASE_7_2_0:1.1
	RELEASE_7_1_0:1.1
	RELEASE_6_4_0:1.1
	RELEASE_5_EOL:1.1
	RELEASE_7_0_0:1.1
	RELEASE_6_3_0:1.1
	PRE_XORG_7:1.1
	RELEASE_4_EOL:1.1;
locks; strict;
comment	@# @;


1.1
date	2006.10.31.02.43.25;	author alepulver;	state Exp;
branches;
next	;


desc
@@


1.1
log
@Sguil is an open source tool to implement Network
Security Monitoring (NSM).  NSM is the collection,
analysis, and escalation of indications and warnings
to detect and respond to intrusions.  NSM tools are
used more for network audit and specialized
applications than traditional alert-centric "intrusion
detection" systems.

Want to learn more about Network Security Monitoring
(NSM)? Then check out Richard Bejtlich's recently
released book, The Tao of Network Security Monitoring:
Beyond Intrusion Detection. An excerpt reads:

"Network security monitoring (NSM) equips security
staff to deal with the inevitable consequences of too
few resources and too many responsibilities. NSM collects
the data needed to generate better assessment, detection,
and response processes--resulting in decreased impact from
unauthorized activities."

WWW: http://sguil.sourceforge.net/index.php
pauls@@utdallas.edu

PR:		ports/104227
Submitted by:	Paul Schmehl <pauls at utdallas.edu>
@
text
@Sguil is an open source tool to implement Network 
Security Monitoring (NSM).  NSM is the collection, 
analysis, and escalation of indications and warnings 
to detect and respond to intrusions.  NSM tools are 
used more for network audit and specialized 
applications than traditional alert-centric "intrusion 
detection" systems.

Want to learn more about Network Security Monitoring 
(NSM)? Then check out Richard Bejtlich's recently 
released book, The Tao of Network Security Monitoring: 
Beyond Intrusion Detection. An excerpt reads:

"Network security monitoring (NSM) equips security 
staff to deal with the inevitable consequences of too 
few resources and too many responsibilities. NSM collects 
the data needed to generate better assessment, detection, 
and response processes--resulting in decreased impact from 
unauthorized activities."

WWW: http://sguil.sourceforge.net/index.php
pauls@@utdallas.edu
@
