Snort mailing list archives
Re: Bases for writting snort rules
From: Guy Martial Nkenne Tchassi <nkennetguy () gmail com>
Date: Thu, 6 Jun 2013 18:21:46 +0200
I'm asking that because i have noticed, many security managers use IDS and IPS without even understanding the notion of intrusion. They often think that it can only be caused by a hackers. For my part i've been told it was more than that. But i don't really know what other actions or events are considered like an intrusion in the network. The other reason for my question is that i want to do a survey of network intrusion on a network fonctionning on the bases of a protoclo stack different from TCP/IP. So any documentation or link to documents on caracteristics of intrusions will be very helpfull Thanks. ------------------------------------------------------------------------------ How ServiceNow helps IT people transform IT departments: 1. A cloud service to automate IT design, transition and operations 2. Dashboards that offer high-level views of enterprise services 3. A single system of record for all IT processes http://p.sf.net/sfu/servicenow-d2d-j _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Bases for writting snort rules Guy Martial Nkenne Tchassi (May 16)
- Re: Bases for writting snort rules lists () packetmail net (May 16)
- Re: Bases for writting snort rules Guy Martial Nkenne Tchassi (Jun 04)
- Re: Bases for writting snort rules Joel Esler (Jun 04)
- Re: Bases for writting snort rules Guy Martial Nkenne Tchassi (Jun 06)
- Re: Bases for writting snort rules Guy Martial Nkenne Tchassi (Jun 04)
- Re: Bases for writting snort rules lists () packetmail net (May 16)