Hi Gautam,
Can you please mention those references that have tried to incorporate
email reputation systems into an IDS? To me, it appears that this type
of solutions are more close to creating a "black-list" rather than
core functionality of IDS i.e detecting an attack (malicious
activities).

-sanjay

On Sun, Nov 23, 2008 at 6:51 AM, Gautam Singaraju
<[EMAIL PROTECTED]> wrote:
> All,
>
> I have been working in email reputation system that has computed
> sender reputations for over an year. I believe that there are couple
> of efforts to incorporate email reputations into IDSs. Is someone in
> the group working on this? Are there any IDSs which can be configured
> to perform extensive analysis for non-reputable senders? I would be
> interested in sharing this data with other researchers in the group.
>
> ---
> Gautam
>
> ------------------------------------------------------------------------
> Test Your IDS
>
> Is your IDS deployed correctly?
> Find out quickly and easily by testing it
> with real-world attacks from CORE IMPACT.
> Go to 
> http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
> to learn more.
> ------------------------------------------------------------------------
>
>



-- 
Computer Security Learner

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
 
to learn more.
------------------------------------------------------------------------

Reply via email to