IDS mailing list archives

Re: Need advices regarding signature tunning...


From: Jason <security () brvenik com>
Date: Fri, 21 Sep 2007 14:13:54 -0400



Jean-Pierre FORCIOLI wrote:
Hi,

I reviewed several IDS/IPS products and I concluded that there is two kind
of signatures languages.
First one, the simplest, allows attack detection customization by changing
some value in the signature, or allows creating new attack by adding a one
line rule (snort rule).

Simple snort rule.

Second one, the hardest,  allows full signature or new protocol state machine
development. by mean of a complete programming language (N-code).

Multiple Snort rules to model protocol state.


I would like to know what are the pro/cons of using both methods. I would
appreciate some feedback from some real life experiences, if possible.

Effectiveness for the stated purpose. Each approach has it's place
depending on the complexity of the vulnerability as it can be observed
on the wire.


TIA.

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw 
to learn more.
------------------------------------------------------------------------



------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw 
to learn more.
------------------------------------------------------------------------


Current thread: