Thanks for the attachment spam.
--
ME2
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of preeth k
Sent: Tuesday, February 22, 2005 4:36 AM
To: [email protected]
Subject: [Full-Disclosure] IDS Signatures
Hi,
I am designing a Network Intrusion Detection System in Linux. I want
to create a database of intrusion signatures using MySQL database. Can
anyone please give an idea about what all fields I have to include, how to store
packet payload, which pattern matching algorithm to use, etc. (Will Boyer-Moore
algorithm be appropriate for pattern matching in
IDS?)
Regards,
Preeth.
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
