List is sorted by rating
Rating (?)
Tweets (*)
pr *
  • DShield
  • www.dshield.org
  • Distributed Intrusion Detection System collects firewall log excerpts from volunteers. The logs are aggregated and analyzed. Several reports are generated showing trends in attack sources and methods used.
3.9
(1)
>10
6
  • Internet Storm Center
  • isc.incidents.org
  • Operated by the SANS Institute, the ISC provides a user-supported infrastructure for intrusion detection systems to share information about ongoing attacks that span countries, networks, and administrative boundaries.
3.9
(si*)
<10
7
  • myNetWatchman.com
  • www.mynetwatchman.com
  • Intrusion Reporting and Response. Users forward firewall logs that are aggregated and analysed to identify incidents that are reported to the responsible party.
3.5
(si*)
<5
5
  • Talisker Security Wizardry
  • www.securitywizardry.com
  • Large index of computer security resources, including a glossary of Intrusion Detection and Prevention systems.
3.2
(si*)
>20
0
Similar categories: