IDS mailing list archives

Anamoly based network IDS


From: vishal p <vishalsec () yahoo com>
Date: Wed, 26 Mar 2003 23:03:29 -0800 (PST)

Hi Lau Ker Chea
To Understand anomaly base -ids , refer to the
following link
http://www.securityfocus.com/infocus/1663
his is the basic article which shows the difference
between signature 
base IDS and protocol based IDS
Anomaly IDS works on the protocol analysis only...
Symantec MAnhunt is the good example for that..
Please mail me regarding any query 

Vishal



 Lau Ker Chea <kerchea79 () yahoo com> wrote:may i know
what type of 
references can i refer to for
the anomaly-based NIDS? 

is there any resources related to source code using in
anomaly-based NIDS? 

pls giv me the URL related or the attach files.
thanks!



=====
Regards

Vishal Pranjale, CISSP

__________________________________________________
Do you Yahoo!?
Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop!
http://platinum.yahoo.com

-----------------------------------------------------------
ALERT: Exploiting Web Applications- A Step-by-Step Attack Analysis
Learn why 70% of today's successful hacks involve Web Application
attacks such as: SQL Injection, XSS, Cookie Manipulation and Parameter 
Manipulation.
http://www.spidynamics.com/mktg/webappsecurity71


Current thread: