Snort is a network intrusion detection and prevention system. It is the most widely deployed technology of its kind in the world. It performs detection using a variety of methods including rules-based detection, anomaly detection, and heuristic analysis of network traffic. Its rules language is open source and available to the public as well.
Sound of Traffic is an application that converts TCP/IP header information into MIDI notes via the Java Synthesizer. Its purpose is to listen in on network traffic in ordered time via a tempo rather than in real-time, which could be more chaotic. In this sense it becomes closer to music then noise.
OpenArm is an implementation of the Open Group's Application Response Measurement (ARM) standard. It provides a complete implementation of the ARM 4.0 Java interfaces, as well as ARM agent functionality that allows you to record your transaction events as log4J logging events, JMS messages, SNMP traps, JMX notifications, or as records in a relational database.
NetOculus is a network monitoring system that provides all the functions of the well-known monitoring system MRTG. It also has a number of its own benefits. It can automatically monitor any kind of detectable alteration in a computer network (and in relatively separated network areas). It can efficiently notify staff about hardware state changes. Analytical information is aggregated. Specific pieces of hardware are associated with the staff members who responsible for them. The solutions for solved problems are reported to the staff for further use.
IptablesWeb allows a user to inspect iptables logs and to receive email and alerts using a Web browser. It is plugin-based, portable to any database, and supports multiple languages and multiple users. It features the ability to duplicate each plugin in any number of blocks, each with its own characteristics. The update (refresh) time can be set on each block to reduce the CPU load. Blocks can be dragged and dropped to change their display order.
Pandora is a distributed system to monitor processes, performance, status, application, or operating parameters of almost any operating system. It has a decentralized management system, based on flexible user profiles, that allows the user to generate graphical reports, define alarms, and a full incident management system to operate a 24x7 monitoring team.