Thanks for creating secviz.org. I have added a link to a parser for Netfilter/iptables rules called "nf2csv" that is distributed with the latest release of psad. I have also uploaded a couple of graphs that were generated from parsing the iptables logs that are distributed with the Honeynet scan challenge (#34).
-- Michael Rash http://www.cipherdyne.org/ Key fingerprint = 53EA 13EA 472E 3771 894F AC69 95D8 5D6B A742 839F On Nov 27, 2006, Raffael Marty wrote: > I launched a new portal that deals with visualization of log files: > > http://secviz.org/ > > The portal can only survive if people - you - take an active part in = > contributing content. > > There are multiple resources available where community input is most = > welcome: > > * Graph Exchange: The idea is that people can submit their graphs, = > explain why they think the graphs are useful, and how they generated = > them. > * Parser Exchange: To generate graphs, you need to parse your data. This = > is a place where you can submit your parsers. > * Links: A whole bunch of links around data analysis and visualization. > * Discussions: A free forum where you can start discussions around the = > topics of log visualization and analysis. > > Let me know what you think and most importantly, submit your graphs: = > http://secviz.org/?q=3Dimage/tid/1 > > -raffy > > > ------------------------------------------------------------------------ > Test Your IDS > > Is your IDS deployed correctly? > Find out quickly and easily by testing it > with real-world attacks from CORE IMPACT. > Go to > http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw > > to learn more. > ------------------------------------------------------------------------ ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
