Snort mailing list archives

Question - snort v2.9.6.0 rules


From: Eray Balkanli <Eray.Balkanli () Dal Ca>
Date: Tue, 4 Mar 2014 17:07:46 +0000

Hi,


I am a graduate Computer Science student at Dalhousie University. I have been working on some network records by using 
the rules included in Snort v2.9.6.0. I have a question related to those rules; I will be grateful if you reply.


May I ask that for how many recent years the defined rules are based on? I mean, from which year the attack signatures 
of malicious packets have been regarded?


Thank you very much in advance!


Best regars,

Eray
------------------------------------------------------------------------------
Subversion Kills Productivity. Get off Subversion & Make the Move to Perforce.
With Perforce, you get hassle-free workflows. Merge that actually works. 
Faster operations. Version large binaries.  Built-in WAN optimization and the
freedom to use Git, Perforce or both. Make the move to Perforce.
http://pubads.g.doubleclick.net/gampad/clk?id=122218951&iu=/4140/ostg.clktrk
_______________________________________________
Snort-devel mailing list
Snort-devel () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-devel
Archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-devel

Please visit http://blog.snort.org for the latest news about Snort!

Current thread: