[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [Full-Disclosure] IDS Signatures
- To: "'preeth k'" <k_preeth@xxxxxxxxxxxxxx>, <full-disclosure@xxxxxxxxxxxxxxxx>
- Subject: RE: [Full-Disclosure] IDS Signatures
- From: "Micheal Espinola Jr" <michealespinola@xxxxxxxxx>
- Date: Tue, 22 Feb 2005 08:01:40 -0500
Thanks for the attachment spam.
--
ME2
my home: < <http://www.santeriasys.net/> http://www.santeriasys.net/>
my photos: < <http://mespinola.blogspot.com/>
http://mespinola.blogspot.com/>
_____
From: full-disclosure-bounces@xxxxxxxxxxxxxxxx
[mailto:full-disclosure-bounces@xxxxxxxxxxxxxxxx] On Behalf Of preeth k
Sent: Tuesday, February 22, 2005 4:36 AM
To: full-disclosure@xxxxxxxxxxxxxxxx
Subject: [Full-Disclosure] IDS Signatures
Hi,
I am designing a Network Intrusion Detection System in Linux. I want to
create a database of intrusion signatures using MySQL database. Can anyone
please give an idea about what all fields I have to include, how to store
packet payload, which pattern matching algorithm to use, etc. (Will
Boyer-Moore algorithm be appropriate for pattern matching in IDS?)
Regards,
Preeth.
<http://clients.rediff.com/signature/track_sig.asp>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html