[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <421b2d1f.35acfc10.6bb1.266b@smtp.gmail.com>
From: michealespinola at gmail.com (Micheal Espinola Jr)
Subject: IDS Signatures
Thanks for the attachment spam.
--
ME2
my home: < <http://www.santeriasys.net/> http://www.santeriasys.net/>
my photos: < <http://mespinola.blogspot.com/>
http://mespinola.blogspot.com/>
_____
From: full-disclosure-bounces@...ts.netsys.com
[mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf Of preeth k
Sent: Tuesday, February 22, 2005 4:36 AM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] IDS Signatures
Hi,
I am designing a Network Intrusion Detection System in Linux. I want to
create a database of intrusion signatures using MySQL database. Can anyone
please give an idea about what all fields I have to include, how to store
packet payload, which pattern matching algorithm to use, etc. (Will
Boyer-Moore algorithm be appropriate for pattern matching in IDS?)
Regards,
Preeth.
<http://clients.rediff.com/signature/track_sig.asp>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050222/e2caae44/attachment.html
Powered by blists - more mailing lists