Top > Security > Firewalls > Port Scan Attack Detector
For the 2.4.x kernels psad incorporates many of the TCP signatures included in Snort to detect suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) can be leveraged against a machine via nmap.
|
|
User README included and available in HTML format from http://www.cipherdyne.com/psad/psaddoc.htmlSupport contacts
Help List | <mbr@cipherdyne.com> |
Developer List | <mbr@cipherdyne.com> |
Bug List | <mbr@cipherdyne.com> |
Maintainers |
|
Developers |
|
Contributors |
|
Source repository | http://www.cipherdyne.com/cgi/viewcvs.cgi/psad/ |
Interfaces | daemon |
Programs | Unix::Syslog, whois |
Source languages | Perl |
License verified by | Janet Casey <jcasey@gnu.org> on 2002-05-02 |
Entry compiled by | Janet Casey <jcasey@gnu.org> |
Categories
The copyright licensing notice below applies to this text. The software described in this text has its own copyright notice and license, which can usually be found in the distribution itself.
Copyright © 2000, 2001, 2002, 2003, 2004 Free Software Foundation, Inc.
Permission is granted to copy, distribute, and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of this license is included in the file COPYING.DOC.
Please report any problems in this page to bug-directory@gnu.org, or find out how you can help fix them.
The FSF provides this directory as a service to the free software community. Please consider donating to the FSF to help support this project.