Home page logo
/

snort logo Snort mailing list archives

Re: Bases for writting snort rules
From: Guy Martial Nkenne Tchassi <nkennetguy () gmail com>
Date: Thu, 6 Jun 2013 18:21:46 +0200

I'm asking that because i have noticed, many security managers use IDS
and IPS without even understanding the notion of intrusion. They often
think that it can only be caused by a hackers. For my part i've been
told it was more than that. But i don't really know what other actions
or events are considered like an intrusion in the network.
The other reason for my question is that i want to do a survey of
network intrusion on a network fonctionning on the bases of a protoclo
stack different from TCP/IP.
So any documentation or link to documents on caracteristics of
intrusions will be very helpfull

Thanks.

------------------------------------------------------------------------------
How ServiceNow helps IT people transform IT departments:
1. A cloud service to automate IT design, transition and operations
2. Dashboards that offer high-level views of enterprise services
3. A single system of record for all IT processes
http://p.sf.net/sfu/servicenow-d2d-j
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault