Snort mailing list archives

FW: Snort & DoS


From: "Tony Reusser" <treusser () filertel com>
Date: Mon, 15 Oct 2012 10:13:20 -0600

Alex,

 

In my experience, what you are looking for is already in there.  I just run
the standard VRT rules, SO rules and ET rules.  I'm new to this, but already
in the past month, I've discovered several DoS situations that I've been
able to mitigate with ACLs and firewall rules.

 

                -tkr

 

From: Alex Adamos [mailto:alexthakidadam () hotmail com] 
Sent: Monday, October 15, 2012 9:49 AM
To: snort user list
Subject: [Snort-users] Snort & DoS

 

Hi to all,

i was trying to figure out what Snort can do with DoS attacks. Is there any
mechanism, either signature-based or anomaly-based or preprocessor-based,
either from Snort itself or from 3rd party projects to detect (or just alert
if there is any potential of a such attack) any of the most common DoS
attacks as SYN flood, ping floods, e-mail bombing, UDP DoS??

Alex.

Attachment: ATT00052.txt
Description:

Attachment: ATT00055.txt
Description:

------------------------------------------------------------------------------
Don't let slow site performance ruin your business. Deploy New Relic APM
Deploy New Relic app performance management and know exactly
what is happening inside your Ruby, Python, PHP, Java, and .NET app
Try New Relic at no cost today and get our sweet Data Nerd shirt too!
http://p.sf.net/sfu/newrelic-dev2dev
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!

Current thread: