Home page logo

snort logo Snort mailing list archives

Re: Bases for writting snort rules
From: Guy Martial Nkenne Tchassi <nkennetguy () gmail com>
Date: Tue, 4 Jun 2013 13:02:25 +0100

Thanks for your reaction but i'm still not understanding the criteria on
wich snort rules currently released on snort.org are written.
The purpose for this question is to know how to obtain the description of
well-known intrusions in order to get a clearer definition of what is an

Please help me understand better.

2013/5/16 lists () packetmail net <lists () packetmail net>

On 05/16/2013 07:34 AM, Guy Martial Nkenne Tchassi wrote:
Then for each treat, there is a
sort of predefined set of actions that can be undertaken to eliminate the

The 'References' section of the individual signatures are a good place to
some context around the particular signature and potential remediation
 That being said, the references are not comprehensive nor are they a
to full remediation.  I'm unaware of any database that provides a mapping
snort signatures to incident severity to remediation/mitigation methods.
 As I
understand it this task is the responsibility of the IDS analyst and is
one of the core roles I believe an analyst should be capable of performing.
Remediation options and mitigation approaches will also vary based on
organizational risk assessment, LOB impact, etc.

Should such an undertaking occur to develop such a data warehouse I see it
daunting with a high propensity to be incomplete and unable to address the
needs of each organization.


How ServiceNow helps IT people transform IT departments:
1. A cloud service to automate IT design, transition and operations
2. Dashboards that offer high-level views of enterprise services
3. A single system of record for all IT processes
Snort-sigs mailing list
Snort-sigs () lists sourceforge net

Please visit http://blog.snort.org for the latest news about Snort!

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]