What is the CINS Army?

The CINS Army is a collaborative effort spearheaded by Sentinel IPS to defend your fundamental right to be secure on any network. Our CINS Army also helps defend your network and facilitates the opportunity for you to contribute to the security of others. It’s a tool we use to join together for the mutual benefit of all CINS Army participants, or as we like to call them, “volunteers.”

The CINS Army is a growing movement dedicated to defending your right to be secure. Our volunteers contribute and receive the benefit of gathering and applying collective intelligence and work with security professionals from around the world.

What is the CINS Army Brief?

The CINS Army Brief provides intelligence from behind enemy lines. It is our monthly newsletter dedicated to providing you the Recon data you need to protect your IT networks from enemy attacks. We collect network security related information from well-respected resources, repackage it in easy-to-access news links, and keep you fully briefed (hence the name CINS Army Brief) and in-the-know with all things secure.

What is Collective Intelligence?

Think of Collective Intelligence (CI) as a human security network comprised of Sentinel IPS end-users combined with a security infrastructure. Each Sentinel IPS (ci) unit is a node on the Sentinel IPS Management System (SMS) private secure wide area network (WAN.) The SMS WAN and its users serve as a Collective Intelligence network to support the security efforts of each individual. The CI network is used by all. When a “bad guy” attempts to harm an individual Sentinel IPS user, the attack is defeated and the intelligence is shared by the InfoSec community. In many cases, this allows Sentinel IPS CI protected networks offers immunity to an attack because it was defended preemptively. We’re constantly improving our CI technology and working with global security professionals because we believe the future of network security must be a collective effort.

What is the Sentinel Collective Intelligence Malicious IP Address List?

Sentinel IPS units are in-line devices installed on premise and in front of firewalls. They are undetectable because they exist on the network as a promiscuous Layer 2 Bridge. We use our DPAM technology to allow all Sentinel IPS units to act as detectors for malicious traffic. Each Sentinel IPS unit “teaches” the others what IP addresses to proactively block. The ability to gather information that may, or may not be correlated to a specific attack, is built into each Sentinel IPS unit. This is not a honeypot function. One analogy is like listening to background noise that a noise-cancelling headset eliminates. We believe there is great value in analyzing what others may miss. Monitoring this background traffic, we use the intelligence gathered to create IP address groups, which are prevented from connecting to Sentinel IPS protected networks.

What is the Sentinel Collective Intelligence Malicious IP Ruleset distributed by Emerging Threats?

We are pleased to work with the InfoSec community and Emerging Threats. This vital open-source project helps the Sentinel Collective Intelligence Malicious IP Address List data be compatible with Suricata, Snort Rulesets and other popular firewall rulesets. It also provides a good way to automate deep packet inspection within your network security.

  • Privacy Policy
Please Note: As of October 2013, we’ve expanded the reach of this list. What used to be a simple ‘Top 100’ offending IP addresses has now expanded to a list of IP addresses that meet the above criteria. The rationale for both lists is similar, so it should not impact the efficacy of the list. We just wanted everyone to be aware of the change.

[blog number_posts=“5” class=“titleOfContent” id=“titleOfContent”][/blog]