IDS mailing list archives
Anamoly based network IDS
From: vishal p <vishalsec () yahoo com>
Date: Wed, 26 Mar 2003 23:03:29 -0800 (PST)
Hi Lau Ker Chea To Understand anomaly base -ids , refer to the following link http://www.securityfocus.com/infocus/1663 his is the basic article which shows the difference between signature base IDS and protocol based IDS Anomaly IDS works on the protocol analysis only... Symantec MAnhunt is the good example for that.. Please mail me regarding any query Vishal Lau Ker Chea <kerchea79 () yahoo com> wrote:may i know what type of references can i refer to for the anomaly-based NIDS? is there any resources related to source code using in anomaly-based NIDS? pls giv me the URL related or the attach files. thanks! ===== Regards Vishal Pranjale, CISSP __________________________________________________ Do you Yahoo!? Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop! http://platinum.yahoo.com ----------------------------------------------------------- ALERT: Exploiting Web Applications- A Step-by-Step Attack Analysis Learn why 70% of today's successful hacks involve Web Application attacks such as: SQL Injection, XSS, Cookie Manipulation and Parameter Manipulation. http://www.spidynamics.com/mktg/webappsecurity71
Current thread:
- Anamoly based network IDS vishal p (Mar 27)
- Re: Anamoly based network IDS Lance Spitzner (Mar 27)
- <Possible follow-ups>
- RE: Anamoly based network IDS Graham, Robert (ISS Atlanta) (Mar 28)
- Re: Anamoly based network IDS Brian Hernacki (Mar 28)