(Good snort source code analysis information, the author first introduces the snort principle and architecture, and then analyzes the snort source code, which is very helpful for understanding intrusion/intrusion detection
Jiujian's snort analysis\Chapter 1_System architecture overview.pdf
Nine cheap snort analysis\Chapter 7_Packet management.pdf
Nine base snort analysis\Chapter 3_Open data interception interface.pdf
Nine base snort analysis\Chapter 2_System initialization.pdf
Nine base snort analysis\Chapter 5_Detection rule initialization engine.pdf
Nine cheap snort analysis\Chapter 6_Building rules fast matching engine.pdf
Nine base snort analysis\Chapter 4_Plugin initialization.pdf
pudn.txt
.....)