Risk
7/22/2010
11:29 AM
Connect Directly
RSS
E-Mail
50%
50%

DHS Releases Intrusion Detection Software

Suricata, developed by the Department of Homeland Security-funded Open Information Security Foundation, is available under the GPLv2 license.

A Department of Homeland Security (DHS)-funded foundation has released open source software for detection and prevention of network intrusions.

The Open Information Security Foundation (OISF) -- funded by the Navy's space and warfare command, security vendors, and the DHS -- has released source code for the Suricata Engine.

The engine is meant to "bring new ideas and technologies" to the field of intrusion prevention and detection, not merely replace or emulate existing tools, according to the OISF website. Intrusion detection and prevention technology monitors networks for suspicious or malicious activity.

Suricata uses the same ruleset as Snort, another free and open source intrusion detection and prevention technology. However, the group claims on its website that Suricata has "other capabilities above and beyond the standard Snort rulesets."

The Suricata Engine, as well as HTP Library, are available under the GNU General Public License v2. The HTP Library is required for integrating and providing advanced processing of http streams for Suricata. People also can use it independently for other applications and tools, according to the OISF.

As well as being a primary funder, the DHS directorate for science and technology homeland open security technology (HOST) program also oversees OISF. The foundation is meant to engage in "cutting-edge security technology research," according to its website.

The DHS funds numerous IT projects through a variety of grants, and it's likely their backing of OISF was a part of this activity. It's unclear whether the agency plans to use Suricata internally, and DHS spokespeople did not respond immediately to a question about plans to do so.

Security vendors backing the OISF include Everis, Breach Security Labs, and NitroSecurity.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0985
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.

CVE-2014-0986
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.

CVE-2014-0987
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.

CVE-2014-0988
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.

CVE-2014-0989
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.

Best of the Web
Dark Reading Radio