Intrusion Detection Systems mailing list archives

RE: Forensics Methodology


From: ajcblyth () glam ac uk (Blyth A J C (Comp))
Date: Mon, 6 Dec 1999 10:07:04 -0000



That is a very good question - A very simple answer is that you will need to
comply with the rules of evidence for the country that you are in.

I know that in the US logs generated by some IDS products have been accepted
as evidence. I am not aware of this being true in an other country.

regards

Andrew.

-----Original Message-----
From: Subba Rao [SMTP:subb3 () ibm net]
Sent: 04 December 1999 13:01
To:   IDS Discussion List
Subject:      IDS: Forensics Methodology

FAQ: See http://www.ticm.com/kb/faq/idsfaq.html
IDS: See http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html
HELP: Having problems... email questions to ids-owner () uow edu au
NOTE: Remove this section from reply msgs otherwise the msg will bounce.
SPAM: DO NOT send unsolicted mail to this list.
--------------------------------------------------------------------------
-
---

Is there any forensics methodology that is recommended after IDS/NIDS
reports
about an intrusion or missuse?

Thank you.

Subba Rao
subb3 () ibm net
http://pws.prserv.net/truemax/



Current thread: