Snort rules

With the rise in cyber attacks in recent years, technologies that can mitigate the losses of affected businesses must be taken into account.

IDS are part of these mitigation technologies, since their main function is to detect abnormal behavior or unwanted access attempts within our network.

The aim of this course is to approach Snort, an IDS, and to show how it works based on rules, which can be adapted to our needs in order to detect the behaviors that may affect our company.

Documents: