Full Disclosure mailing list archives
RE: IDS Signatures
From: "Micheal Espinola Jr" <michealespinola () gmail com>
Date: Tue, 22 Feb 2005 08:01:40 -0500
Thanks for the attachment spam. -- ME2 my home: < <http://www.santeriasys.net/> http://www.santeriasys.net/> my photos: < <http://mespinola.blogspot.com/> http://mespinola.blogspot.com/> _____ From: full-disclosure-bounces () lists netsys com [mailto:full-disclosure-bounces () lists netsys com] On Behalf Of preeth k Sent: Tuesday, February 22, 2005 4:36 AM To: full-disclosure () lists netsys com Subject: [Full-disclosure] IDS Signatures Hi, I am designing a Network Intrusion Detection System in Linux. I want to create a database of intrusion signatures using MySQL database. Can anyone please give an idea about what all fields I have to include, how to store packet payload, which pattern matching algorithm to use, etc. (Will Boyer-Moore algorithm be appropriate for pattern matching in IDS?) Regards, Preeth. <http://clients.rediff.com/signature/track_sig.asp>
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- IDS Signatures preeth k (Feb 22)
- RE: IDS Signatures Micheal Espinola Jr (Feb 22)
- Re: IDS Signatures Valdis . Kletnieks (Feb 22)
- Re: IDS Signatures John Galt (Feb 24)
- Re: IDS Signatures Frank Knobbe (Feb 24)
- Re: IDS Signatures John Galt (Feb 24)
- <Possible follow-ups>
- RE: IDS Signatures Michael Scheidell (Feb 22)