Full Disclosure mailing list archives
IDS Signatures
From: "preeth k" <k_preeth () rediffmail com>
Date: 22 Feb 2005 09:36:21 -0000
Hi, I am designing a Network Intrusion Detection System in Linux. I want to create a database of intrusion signatures using MySQL database. Can anyone please give an idea about what all fields I have to include, how to store packet payload, which pattern matching algorithm to use, etc. (Will Boyer-Moore algorithm be appropriate for pattern matching in IDS?) Regards, Preeth.
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- IDS Signatures preeth k (Feb 22)
- RE: IDS Signatures Micheal Espinola Jr (Feb 22)
- Re: IDS Signatures Valdis . Kletnieks (Feb 22)
- Re: IDS Signatures John Galt (Feb 24)
- Re: IDS Signatures Frank Knobbe (Feb 24)
- Re: IDS Signatures John Galt (Feb 24)
- <Possible follow-ups>
- RE: IDS Signatures Michael Scheidell (Feb 22)