psad is a Netfilter log analysis tool, and the psad-2.0 release is now available: http://www.cipherdyne.org/psad/ This release will be discussed in my upcoming book "Linux Firewalls: Attack Detection and Response": http://www.nostarch.com/firewalls.htm Here are some of the highlights: - Completely re-factored Snort rule matching capability. The Snort keywords ttl, id, seq, ack, window, icmp_id, icmp_seq, itype, icode, ipopts, and sameip are now supported directly through Netfilter log messages. - Signature updates are now published on cipherdyne.org at the link below, and psad can download these signatures and put them in place within the filesystem with the new --sig-update command line argument. http://www.cipherdyne.org/psad/signatures - Added the ability to parse Netfilter logs and generate CSV formatted output. This is useful for visualizing Netfilter data with AfterGlow (http://afterglow.sourceforge.net). I have used the --CSV mode along with AfterGlow to graphically represent two of the Honeynet scan challenges (#30 and #34) that include Netfilter log data: http://www.cipherdyne.org/psad/honeynet/scan30/ http://www.cipherdyne.org/psad/honeynet/scan34/ - Enhanced --Analyze output to include a listing of the top scanned ports, top signature matches, and top attackers. Here is an example: http://www.cipherdyne.org/psad/honeynet/scan34/psad-analysis.html - Many other enhancements and bugfixes. Here is the complete Changelog: http://trac.cipherdyne.org/trac/psad/browser/psad/tags/psad-2.0/ChangeLog Please email me with any questions, comments, or suggestions. -- Michael Rash http://www.cipherdyne.org/ Key fingerprint = 53EA 13EA 472E 3771 894F AC69 95D8 5D6B A742 839F