Bugtraq mailing list archives
[Tool] Distack framework for attack detection and traffic analysis
From: Christoph Mayer <mayer () tm uka de>
Date: Wed, 03 Sep 2008 13:47:28 +0200
Hi, I am pleased to announce the Open Source release of "Distack" *** http://www.tm.uka.de/distack *** Distack is a framework for local and distributed attack detection and traffic analysis. It can run on live interfaces or traces files, as well as in simulation environments. Therefore it provides easy ways to develop attack detection mechanisms and evaluate them on a large-scale in simulated networks. Distack has been developed at the Institute of Telematics, University of Karlsruhe in Germany to perform large-scale attack detection (DDoS in our case) in real environments and simulated environments. Whether you want to perform traffic analysis, attack detection or just look into the traffic that runs over your network, Distack gives you a complete environment to implement and evaluate your mechanisms. Distack and a complete documentation is available from: http://www.tm.uka.de/distack To get a quick overview on what Distack does, have a look at the publications covering Distack and current presentations: http://doc.tm.uka.de/2008/Mayer_SECURWARE08.pdf http://doc.tm.uka.de/2008/MaGaZit_Eurecom2008.pdf https://projekte.tm.uka.de/trac/Distack/wiki/DistackPublications We are looking forward to see the community using the Distack Frameworkand would be happy to receive feedback from you! Cooperation in development is also highly appreciated.
Best regards, Chris -- Dipl.-Inform. Christoph P. Mayer Institute of Telematics, University of Karlsruhe (TH) Zirkel 2, 76128 Karlsruhe, Germany Phone: +49 721 608 6415, Email: mayer () tm uka de Web: http://www.tm.uka.de/~mayer/
Current thread:
- [Tool] Distack framework for attack detection and traffic analysis Christoph Mayer (Sep 03)