IDS mailing list archives
Re: IDS detection approaches
From: Stefano Zanero <s.zanero () securenetwork it>
Date: Wed, 10 Oct 2007 21:39:48 +0200
Nelson Brito wrote:
I do agree that SNORT is one of the most popular when you are learning about IDS, but it is possible to attack the IDS engine in a very easy way: 1) evasion; 2) DoS; 3) Flse Positive; 4) you name it...
"Evasion" is a problem against any type of detection technology. Ditto for denial of service. Snort, being a misuse detector, does NOT usually have huge false positive problems, it has bad rules or unwanted true positives instead.
I think the best approach is when vendors get the knowledge of how the vulnerabilties work,
This is just a mantra devoid of content. Even then, evasion, false positives, noncontextual alerts and denial of service possibilities will be there to stay. Stefano ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
Current thread:
- Re: IDS detection approaches, (continued)
- Re: IDS detection approaches Sec urity (Oct 09)
- RE: IDS detection approaches Nelson Brito (Oct 10)
- Re: IDS detection approaches Sec urity (Oct 10)
- Message not available
- Re: IDS detection approaches Sec urity (Oct 12)
- RE: IDS detection approaches Nelson Brito (Oct 12)
- Re: IDS detection approaches Sec urity (Oct 12)
- RE: IDS detection approaches Nelson Brito (Oct 12)
- Re: IDS detection approaches Jason (Oct 12)
- RE: IDS detection approaches Nelson Brito (Oct 15)
- Re: IDS detection approaches Jason (Oct 15)
- Re: IDS detection approaches Sec urity (Oct 09)
- Re: IDS detection approaches Gary Halleen (Oct 15)
- RE: IDS detection approaches Marcio (Oct 18)
