DShield

{{Infobox website

| name = DShield at the
SANS Internet Storm Center

| logo =

| logo_size =

| logo_alt =

| logo_caption =

| screenshot =

| collapsible =

| collapsetext =

| background =

| screenshot_size =

| screenshot_alt =

| caption =

| url = {{URL|www.dshield.org}}

| commercial =

| type =

| registration =

| language =

| num_users =

| content_license =

| programming_language =

| owner = Johannes Ullrich

| author =

| editor =

| launch_date = {{Start date and age|df=yes|2000|11|30}}

| revenue =

| issn =

| eissn =

| oclc =

| current_status =

| footnotes =

}}

DShield is a community-based collaborative firewall log correlation system.{{cite web |url=https://www.techrepublic.com/article/defending-with-dshield/ |title=Defending with DShield |last=Kaelin |first=Mark |date=2000-12-27 |publisher=TechRepublic |agency=CBS Interactive |access-date=2020-04-04 |quote=When defending your network against crackers, knowledge is power. DShield.org helps net admins gain the knowledge they need to safeguard their companies. }} It receives logs from volunteers worldwide and uses them to analyze attack trends. It is used as the data collection engine behind the SANS Internet Storm Center (ISC). DShield was officially launched end of November 2000 by Johannes Ullrich.{{cite news |last1=Lemos |first1=Robert |date=2000-12-06 |title=The Net's new neighbourhood watch |url=https://www.zdnet.com/home-and-office/networking/the-nets-new-neighbourhood-watch/ |department=Networking |publisher=CBS Interactive |agency=ZDNet |access-date=2020-04-04 }} Since then, it has grown to be a dominating attack correlation engine with worldwide coverage.

DShield is regularly used by the media to cover current events.{{cn|date=March 2024}} Analysis provided by DShield has been used in the early detection of several worms, like "Ramen", Code Red, "Leaves", "SQL Snake" and more. DShield data is regularly used by researchers to analyze attack patterns.{{cn|date=March 2024}}

The goal of the DShield project is to allow access to its correlated information to the public at no charge to raise awareness and provide accurate and current snapshots of internet attacks. Several data feeds are provided to users to either include in their own web sites or to use as an aide to analyze events.

__NOTOC__

See also

References

{{reflist}}

Further reading

  • {{cite book |last1=Holden |first1=Greg |year=2007 |chapter=Part II, Chapter 6: Optimizing the Shopping Experience |title=Starting an Online Business For Dummies |edition=Fifth |location=Hoboken, NJ, USA |publisher=Wiley Publishing, Inc. |page=163 |isbn=9780470107393 }}
  • {{cite book |last1=Rash |first1=Michael |year=2007 |editor1-last=Samuell |editor1-first=Christina |title=Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort |url=https://archive.org/details/linuxfirewallsat00rash_461 |url-access=limited |location=San Francisco, CA, USA |publisher=No Starch Press, Inc. / William Pollack |pages=[https://archive.org/details/linuxfirewallsat00rash_461/page/n144 123]-130 |isbn=978-1593271411 }}
  • {{cite book |last1=Fung |first1=Carol |last2=Boutaba |first2=Raouf |year=2017 |chapter=3.4 Selected Intrusion detection networks |title=Intrusion detection networks: a key to collaborative security |publisher=CRC Press |page=30 |isbn=9781138198890 |oclc=1065286709 }}