CERIAS Hotlist
Page Content
- CERIAS: Center for Education and Research in Information Assurance and Security
The worlds foremost university center for multidisciplinary
research and education in areas of information security and information assurance.
http://www.cerias.purdue.edu/ - Added Dec 10, 1999
- ASAX (Advanced Security audit trail Analysis on uniX
http://www.info.fundp.ac.be/~cri/DOCS/asax.html - Added Jun 03, 2003
- ASAX intrusion detection project
Project: ASAX: Efficient Universal Audit Trail Analysis
http://www.info.fundp.ac.be/~cri/DOCS/asax.html - Added Dec 10, 1999
- Bro: A System for Detecting Network Intruders in Real-Time
LBL Network Research Group Papers
http://www-nrg.ee.lbl.gov/nrg-papers.html - Added Mar 29, 2000
- Computer audit FAQ
Answers to frequently asked questions about computer and network auditing. Explains what to expect if computer auditors are about to interview you, and gives practical advice to those considering computer audit as a career.
http://www.isect.com/html/ca_faq.html - Added Jan 05, 2003
- Electronic Commerce and Financial Information Systems: Widely Distributed Data Mining and Fraud Detection
http://www1.cs.columbia.edu/~sal/fstc-ec.html - Added Jun 03, 2003
- Electronic Evidence Information Center
Digital Forensic portal; an extensive listing of links to resources for the Digital Forensic practitioner
http://www.e-evidence.info - Added Nov 09, 2005
- I3P Funding Opportunities
The I3P maintains a comprehensive list, updated at least weekly, of funding opportunities for researchers in the growing field of information security. This service is unrestricted and available free of charge. The listings, gathered from government, industry and private sources, contain links to the original sources and can be sorted by title, submission date, funding type or sponsor.
http://www.thei3p.org/funding/ - Added Aug 18, 2005
- Intrusion Detection, Honeypots, Incident Response
Offers a comprehensive and independent overview of whitepapers, links, howto\'s, tools, mailinglists, and courses related to Intrusion Detection, Honeypots, and Incident Response.
http://www.honeypots.net/ - Added Oct 11, 2003
- INTRUSION.COM
Our combination of networking knowledge and security applications uniquely positions
Intrusion.com to assess an organization's security vulnerabilities, monitor for threats and
s
http://www.intrusion.com/ - Added Mar 29, 2000
- Kerberos: An Authentication Service for Computer Networks
When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to
falsely claim another\'s identity. Kerberos is the most commonly used example of this type of authentication technolog
http://www.isi.edu/gost/publications/kerberos-neuman-tso.htm... - Added Dec 10, 1999
- Lawrence Livermores IDS Site
http://ciac.llnl.gov/cstc/nid/nid.html - Added Dec 10, 1999
- MCN's Intrusion Information
There are many cases in which having the ability to break into a system is valuable.
*Original link bad, now points to http://www.EnGarde.com*
http://www.EnGarde.com - Added Mar 29, 2000
- MegaSecurity
Window snapshots of nearly all trojans and bot command controllers.
http://www.megasecurity.org/ - Added Jul 27, 2006
- NID (Network Intrusion Detector)
http://ciac.llnl.gov/cstc/nid/nid.html - Added Jun 03, 2003
- NITB Intrusion Detection and Response
http://all.net/journal/ntb/ids.html - Added Jun 04, 2003
- Offline Vulnerability Database Tool
The Hackerstorm vulnerability GUI is a free tool which allows the entire Open Source Vulnerability Database (www.osvdb.org) to be viewed offline.
Its purpose is to assist people who are doing security related work when an internet connection is not available. This usually happens during audits, penetrations tests, risk assesments etc. Having an offline tool makes life a little easier, it has even been used in presentations when people talk about security issues.
The only system requirement to use the tool is a flashplayer 7 enabled web browser, it will work on any OS and with any browser.
The database is updated daily.
This tool is provided freely for personal and professional use.
http://www.hackerstorm.com - Added Jul 12, 2005
- SecureRoot Computer Security
One of the oldest and most established security and hacking sites on the internet.
http://www.secureroot.com - Added Dec 26, 2003
- The Last Stage of Delirium - Research Group
The official website of the Last Stage of Delirium Research Group
http://lsd-pl.net/ - Added Apr 22, 2003
- The SHADOW Project
http://www.nswc.navy.mil/ISSEC/CID/ - Added Jun 16, 2000
- World Wide Web (in)Security
An article talking security issues for the world wide web.
http://www.swcp.com/~mccurley/danger/danger.html - Added Dec 10, 1999