Evaluating Network Intrusion Detection Signatures
Security Focus talks about evaluating
network intrusion detection signatures.
"So how can we test the NID signatures? The trick lies not in focusing on the signatures, but instead in focusing on the potential attacks. We may not have much information on the characteristics of signatures, but there is a wealth of information available on attacks, vulnerabilities and exploits. We should determine what threats are important for our environment, and then design and execute NID tests that address those threats."
(Submitted by Noel Mon Sep 16, 2002 )
Our content can be syndicated: Main page Mac Page
Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author