Intrusion Detection Systems mailing list archives

Mod FWD


From: "RuF NineFiveNine" <ruf959 () postmaster co uk>
Date: Mon, 28 Aug 2000 10:16:24 +0100

Archive: http://msgs.securepoint.com/ids
FAQ: http://www.ticm.com/kb/faq/idsfaq.html
IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html
HELP: Having problems... email questions to ids-owner () uow edu au
NOTE: Remove this section from reply msgs otherwise the msg will bounce.
SPAM: DO NOT send unsolicted mail to this list.
UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au
-----------------------------------------------------------------------------
1. Soft Computing in IDS - essam () louisville edu
2. IDS Functionality - ascii246 () postmaster co uk
____________________________________________________________

From: "Essam  Hamed" <essam () louisville edu>
Subject: Soft Computing in IDS
Date: Fri, 25 Aug 2000 10:18:53 -0500

Hello, I need any information/papers/systems about using fuzzy logic and
Neural Networks in IDS
Thanks
______________________________
Essam Hamed
Ph.D. Candidate
University Of Louisville
CECS Department
Intelligent Systems Lab-Room JS003
phone:(502)852-2599
email:essam () louisville edu
_________________________________

____________________________________________________________
From: "ascii 246" <ascii246 () postmaster co uk>
Subject: IDS Functionality
Date: Fri, 25 Aug 2000 07:32:26 +0100

HI, 

I have to make some recommendations on IDS to my Board of Directors, i am reasonably new to 
IDS technology, i need help in understanding some of the issues involved..The areas 
of clarification are.
1. why is packet reassembly important in IDS systems?. isnt this excessively CPU 
intensive, also i have a firewall that does Reassembly, am i still going to need 
reassembly functionality on the IDS aswell. 

2. We have bespoke apps developed in house, which are unlikely to appear in the 
"wild", however, we still would like to have attack recognition in place, is it possible 
to tailor bespoke signatures for inhouse apps, i know i can look for text or strings in 
signatures, but there are certain actions we would like to prevent, which are likely to 
occur from a series of connections, Eg . if this happens + then that happens  + then 
this happens = then this is would be defined as suspicious. can i do this with current 
IDS technology.

3. Host based.IDS will host based work unconnected from the network, if someone 
got physical access to the box, unplugged it from the network, and then downloaded 
the database, could the IDS prevent the download, or even shutdown the box ? 

4. What happens when my Network IDS gets overloaded, does it tell me?, and 
what can i do to share the load.

5. how should i budget the total cost of ownership for IDS, how much of it is capital 
cost, and how much is ongoing management.

thanks any help will be greatly appreciated
____________________________________________________________


Current thread: