[Snort-sigs] Re: [Snort-users] Who doesn't care about virus rules, and why?
cwcwcwg at ...144...
Fri Nov 7 05:55:08 EST 2003
Would you mind posting your rules to illustrate the
One objective for our snort IDS to be installed on our
network backborne is to be faster in respond to the
worm incidents like those ones occurred recently and
it would help great deal if your way really works.
Thanks in advance.
--- Iain Hallam <ccidsh at ...2009...> wrote:
> Williams Jon wrote:
> > What we've ended up doing is monitoring the
> default route path for
> > our network and watching for either TCP SYNs that
> are going places
> > they shouldn't or TCP RST packets generated either
> by the firewall or
> > the odd host that is actually hit. With
> thresholding, we can
> > generate fairly useful alerts in cases where, in
> Blaster's case, one
> > source address sends out TCP port 135 SYN packets
> to more than X
> > number of hosts in Y period of time. This is so
> reliable, in nearly
> > every case we've used it on, that we are able to
> auto-generate email
> > alerts that go to someone else to actually _deal_
> with the problem
> > rather than making the IDS staff track down and
> call each victim
> > independantly.
> We're doing something similar with ICMP on our
> network, but how can you
> tell the difference between large numbers of hosts
> and large numbers of
> packets to a single host? Would you mind posting one
> of your rules to
> illustrate the point?
> This SF.net email is sponsored by: SF.net Giveback
> Does SourceForge.net help you be more productive?
> Does it
> help you create better code? SHARE THE LOVE, and
> help us help
> YOU! Click Here: http://sourceforge.net/donate/
> Snort-users mailing list
> Snort-users at lists.sourceforge.net
> Go to this URL to change user options or
> Snort-users list archive:
Do you Yahoo!?
Protect your identity with Yahoo! Mail AddressGuard
More information about the Snort-sigs