Thanks for the attachment spam.
 
--
ME2
 
my home: <http://www.santeriasys.net/>
my photos: <http://mespinola.blogspot.com/>
 


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of preeth k
Sent: Tuesday, February 22, 2005 4:36 AM
To: [email protected]
Subject: [Full-Disclosure] IDS Signatures

Hi,
I am designing a Network Intrusion Detection System in Linux. I want to  create a database of intrusion signatures using MySQL database. Can anyone please give an idea about what all fields I have to include, how to store packet payload, which pattern matching algorithm to use, etc. (Will Boyer-Moore algorithm be appropriate for pattern matching in IDS?)
Regards,
Preeth.



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to