> Therefore, the early thought that comes > into my mind is "creating an automated signature generation tool is as > difficult as creating an automated attack generation tool". I would > like to know your opinion on this.
I would say no. That is, I think it would be easier to create an automated signature generation tool that it would be to create an automated exploit generation tool. This is based on my experience with machine learning algorithms and penetration testing. This of course with the caveats: - To create a signature for a single vulnerability, the generation tool would need to have a set of exploits for that vulnerability and a large body of harmless traffic to compare it against. - The signature generation tool would not be able to generate false-positive and false-negative free signatures (who does?). However, for simpler cases the error rates could be quite low and possibly even measurable. As far as your comments about detecting flooding attacks, I think this may actually be harder to get right. HTH, tim ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
