slackbuilds_ponce/network/snort
Erik Hanson 4248415dde Add REQUIRED field to .info files.
Signed-off-by: Erik Hanson <erik@slackbuilds.org>
2012-08-19 21:57:51 -05:00
..
doinst.sh
rc.snort
README
README.SLACKWARE
slack-desc Entire Repo: Fix the "handy ruler" length in slack-desc files 2012-08-15 20:27:00 -05:00
snort.info Add REQUIRED field to .info files. 2012-08-19 21:57:51 -05:00
snort.SlackBuild

Snort is an open source network intrusion detection and prevention system.
It is capable of performing real-time traffic analysis, alerting, blocking
and packet logging on IP networks. It utilizes a combination of protocol
analysis and pattern matching in order to detect a anomalies, misuse and
attacks.
Snort uses a flexible rules language to describe activity that can be
considered malicious or anomalous as well as an analysis engine that
incorporates a modular plugin architecture. Snort is capable of detecting
and responding in real-time, sending alerts, performing session sniping,
logging packets, or dropping sessions/packets when deployed in-line.

Snort has three primary functional modes.  It can be used as a packet
sniffer like tcpdump(1), a packet logger (useful for network traffic
debugging, etc), or as a full blown network intrusion detection and
prevention system.

This requires libdnet and daq.