Hi Gautam, Can you please mention those references that have tried to incorporate email reputation systems into an IDS? To me, it appears that this type of solutions are more close to creating a "black-list" rather than core functionality of IDS i.e detecting an attack (malicious activities).
-sanjay On Sun, Nov 23, 2008 at 6:51 AM, Gautam Singaraju <[EMAIL PROTECTED]> wrote: > All, > > I have been working in email reputation system that has computed > sender reputations for over an year. I believe that there are couple > of efforts to incorporate email reputations into IDSs. Is someone in > the group working on this? Are there any IDSs which can be configured > to perform extensive analysis for non-reputable senders? I would be > interested in sharing this data with other researchers in the group. > > --- > Gautam > > ------------------------------------------------------------------------ > Test Your IDS > > Is your IDS deployed correctly? > Find out quickly and easily by testing it > with real-world attacks from CORE IMPACT. > Go to > http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw > to learn more. > ------------------------------------------------------------------------ > > -- Computer Security Learner ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
