I am also in the process of implementing a NIDS in Linux, only I am
attempting to make it proactive, more like an IPS. As far as your work
is concerned, do take a look at snort. Installing it is a breeze (
atleast on FC2 and before that i was). It pushes packets onto mysql,
so once installed, all
On Thu, 2005-02-24 at 22:33 +0530, John Galt wrote:
I am also in the process of implementing a NIDS in Linux, only I am
attempting to make it proactive, more like an IPS. As far as your work
is concerned, do take a look at snort. [...]
With regard to my task of making the system proactive, can
Hi,
I am designing a Network Intrusion Detection System in Linux. I want to create a database of intrusion signatures using MySQL database. Can anyone please give an idea about what all fields I have to include, how to store packet payload, which pattern matching algorithm to use, etc. (Will
-Disclosure] IDS
Signatures
Hi,I am designing a Network Intrusion Detection System in Linux. I want
to create a database of intrusion signatures using MySQL database. Can
anyone please give an idea about what all fields I have to include, how to store
packet payload, which pattern matching algorithm
Title: Message
See www.snort.org
all
the source code is there, as well as hundreds of sample IDS
signatures.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
On Tue, 22 Feb 2005 09:36:21 GMT, preeth k said:
I am designing a Network Intrusion Detection System in Linux. I want to create
a database of intrusion signatures using MySQL database. Can anyone please
give an idea about what all fields I have to include, how to store packet
payload, which