Full Disclosure mailing list archives

RE: IDS Signatures


From: "Micheal Espinola Jr" <michealespinola () gmail com>
Date: Tue, 22 Feb 2005 08:01:40 -0500

Thanks for the attachment spam.
 
--
ME2
 
my home: < <http://www.santeriasys.net/> http://www.santeriasys.net/>
my photos: < <http://mespinola.blogspot.com/>
http://mespinola.blogspot.com/>
 

  _____  

From: full-disclosure-bounces () lists netsys com
[mailto:full-disclosure-bounces () lists netsys com] On Behalf Of preeth k
Sent: Tuesday, February 22, 2005 4:36 AM
To: full-disclosure () lists netsys com
Subject: [Full-disclosure] IDS Signatures



Hi,
I am designing a Network Intrusion Detection System in Linux. I want to
create a database of intrusion signatures using MySQL database. Can anyone
please give an idea about what all fields I have to include, how to store
packet payload, which pattern matching algorithm to use, etc. (Will
Boyer-Moore algorithm be appropriate for pattern matching in IDS?)
Regards,
Preeth.




 <http://clients.rediff.com/signature/track_sig.asp>  
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Current thread: