Snort Glossary

Important definitions and terminologies used in Snort

A

  • ACID in Snort
  • Active response in Snort
  • Administrative Tools in Snort
  • Alert in Snort
  • Alerts in Snort
  • Application layer in Snort
  • ARP in Snort
  • ASCII in Snort
  • Attack signature in Snort
  • Authentication in Snort
  • Autonomous system in Snort
  • AV in Snort

B

  • Backdoor in Snort
  • Bandwidth in Snort
  • Blacklist in Snort
  • Bot in Snort
  • Botnet in Snort
  • Brute-force attack in Snort

C

  • C&C in Snort
  • Capturing and Viewing Packets in Snort
  • CIDR in Snort
  • Cloud computing in Snort
  • Configuration file in Snort
  • Cookie in Snort
  • Cryptography in Snort

D

  • DDoS in Snort
  • Debugging Rules in Snort
  • Decoder in Snort
  • Defense in depth in Snort
  • Denial of service in Snort
  • Destination IP address in Snort
  • Destination port in Snort
  • Detect Intrusions in Snort
  • DNS in Snort
  • DoS in Snort
  • DPI in Snort
  • Drive-by download in Snort

E

  • E-mail filter in Snort
  • Encryption in Snort
  • Event in Snort
  • Exploit in Snort

F

  • False negative in Snort
  • False positive in Snort
  • Firewall in Snort
  • FTP in Snort

G

  • Gateway in Snort

H

  • Honeypot in Snort
  • HTTP in Snort

I

  • ICMP in Snort
  • IDS in Snort
  • Inbound traffic in Snort
  • Invisibly Sniffing Between Two Network Points in Snort
  • Invisibly Sniffing MB Ethernet in Snort
  • Invisibly Tapping a Hub in Snort
  • IP address in Snort
  • IPS in Snort
  • IPv4 in Snort
  • IPv6 in Snort

J

  • Java in Snort

K

  • Kernel in Snort

L

  • LAN in Snort
  • Log Analysis in Snort
  • Log file in Snort
  • Logger in Snort
  • Logging in Snort
  • Logging Packets in Snort
  • Long rule in Snort
  • LUA in Snort

M

  • MAC address in Snort
  • Malware in Snort
  • Metadata in Snort
  • MITM in Snort
  • Modbus in Snort
  • Monitoring Multiple Network Interfaces in Snort
  • Multicast in Snort

N

  • Network layer in Snort
  • NIC in Snort
  • NIDS in Snort
  • Nmap in Snort

O

  • Open source in Snort
  • Operating system in Snort
  • Other Uses. in Snort
  • Output Plug-ins in Snort

P

  • Packet in Snort
  • Payload in Snort
  • PCAP in Snort
  • Performance in Snort
  • Phishing in Snort
  • Ping in Snort
  • Port in Snort
  • Preprocessing in Snort
  • Promiscuous Mode in Snort
  • Protocol in Snort
  • Proxy in Snort

Q

  • Query in Snort

R

  • Ransomware in Snort
  • Raw packet in Snort
  • Reading a Saved Capture File in Snort
  • Remote code execution in Snort
  • Rootkit in Snort
  • Rules and Signatures in Snort

S

  • Sandbox in Snort
  • Scan in Snort
  • Sniffing Gigabit Ethernet in Snort

T

  • Tapping a Wireless Network in Snort
  • TCP in Snort
  • Telnet in Snort
  • Threat in Snort
  • Trojan in Snort

U

  • UDP in Snort
  • URL in Snort
  • User agent in Snort

V

  • Virus in Snort
  • VLAN in Snort
  • VPN in Snort

W

  • WAN in Snort
  • Wi-Fi in Snort
  • Worm in Snort
  • Write rule in Snort

X

  • XOR in Snort

Z

  • Zero-day in Snort
CVS Glossary
Company Law Glossary

Get industry recognized certification – Contact us

keyboard_arrow_up