Snort mailing list archives
Snort's modules
From: Pratik Narang <pratik.cse.bits () gmail com>
Date: Wed, 25 Jul 2012 18:27:31 +0530
Hi all, I have been playing around with Snort for a while now. I am beginning to wonder that apart from its Signatures being its biggest strength, what else are the things on which Snort relies upon? Prima facie, the preprocessor modules don't involve signatures- am I right here? Does Snort have an Anomaly engine?? If not, i would be interested in knowing how all the network stuff which cannot be detected via signatures (or you may say that I do not wish to use signatures) can be detected with Snort? Thanks...
------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users Please visit http://blog.snort.org to stay current on all the latest Snort news!
Current thread:
- Snort's modules Pratik Narang (Jul 25)
- Re: Snort's modules Joel Esler (Jul 25)
- Re: Snort's modules Russ Combs (Jul 25)
- Re: Snort's modules Pratik Narang (Jul 27)
- Re: Snort's modules Russ Combs (Jul 27)
- Re: Snort's modules Pratik Narang (Jul 27)
- <Possible follow-ups>
- Snort's modules Pratik Narang (Jul 25)
