AirSAM is a desktop GUI that compliments the Web based Snort Alert Monitor. AirSAM gives up to date insight into who might be attacking your network. The ultimate goal is to give audio/visual cues right at the time of the attack. AirSAM is an Adobe Air application and should run on Mac OS, Linux, and Windows.
AlarmMon is an alarm monitoring system for TCP/IP networks. It consists of an "alarm" client, an "alarmsvr" server, and several agents that work with a central registration database. It can track the status of verious services, including BIND, Sendmail, and modems, and send notifications by email, SMS, or pager.
Synapse is an ESB engine and XML router built completely on open standards. It is a mediation framework for XML messages and Web services that allows messages flowing through, into, or out of an organization to be mediated, including aspects such as logging, service lookup, performance mediation, versioning, failover, monitoring, fault management, and tracing.
AutoNOC is a high performance, production integrated, peer-to-peer network operations management platform for Windows and Linux. It provides real-time historical analysis, root cause, fault detection, reporting, alerts and alarms, and no-nonsense correlation. It is an interoperable vendor independent solution with built-in support for Microsoft, Cisco, Linux, IBM, and other major technologies. Additionally it offers many novel capabilities, including end user personalization, easy scalability, compressed historical databases, infinite histories, event archiving (it works as a syslog server), and multi-language support.
The Aware project is an effort to create a software framework for measuring, monitoring, and controlling computer system resources. It is intended to enable system administrators to tune system variables, set monitoring/security alarms, and build adaptive distributed systems. Aware modules may be linked into applications making them 'aware' and able to participate in the larger managed system.
BMCrawler is a stand alone JAVA applet that examines the logs from the Novell BorderManager Proxy or any other proxy that supports Common Log Format and compares the Web sites visited with a list of "bad" sites. A default list of questionable sites (about 1MB in size) is included, however users have the ability to add or delete sites using the program.
The Bait and Switch Honeypot System combines the snort Intrusion Detection System (IDS) with honeypot technology to create a system that reacts to hostile intrusion attempts by marking and then redirecting all "bad" traffic to a honeypot that partially mirrors your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data, while your clients and/or users are still safely accessing the real system. Life goes on, your data is safe, and you get to learn about the bad guy as an added benefit. It works with Snort 1.9.0, 1.9.1, and 2.0.2.
Bandit is a system of loosely-coupled components that provide consistent identity services and create a community that organizes and standardizes identity-related technologies in an open way, promoting both interoperability and collaboration. It implements open standard protocols and specifications so identity services can be constructed, accessed, and integrated from multiple identity sources. The Bandit system supports many authentication methods and provides user-centric credential management.