IDS mailing list archives
Re: Working with/Setting up IDS (Papers)
From: "Patrick S. Harper" <lists () internetsecurityguru com>
Date: 28 Mar 2003 05:10:51 -0800
I just wrote a paper for a Linux-impaired admin friend of mine that several others have found useful as well. It walks you through a RedHat install, then through compiling and configuring snort, acid and all the needed components. It is on my website at: http://www.internetsecurityguru.com/documents/snort_acid_rh8.pdf On Mon, 2003-03-24 at 00:05, David Vertie wrote:
Hey there, For those interested in setting up IDS/learning more about IDS, here are several guides that are on the Web that may help in the endeavour. Feel free to reply and add more guides you have found in the past that were useful. Many of the below stated are pdf documents (Adobe Acrobat) The IDS deployment provides extensive documentation on setting up Snort (a very popular IDS) in various configurations, including spanning with 100/1000 ports which many list members have taken interest in lately. http://www.snort.org/docs/ CERT itself has an article on IDS and its usefulness "Defending Yourself: The Role of Intrusion Detection Systems" http://www.cert.org/archive/pdf/IEEE_IDS.pdf "Intrusion Detection: Implementation and Operation Issues" http://www.stsc.hill.af.mil/crosstalk/2001/01/mchugh.html These papers should greatly assist many people on the list, those who have been asking questions/or watching the list on intrusion detection. Good luck in your IDS endeavors. _________________________________________________________________ Add photos to your e-mail with MSN 8. Get 2 months FREE*. http://join.msn.com/?page=features/featuredemail ----------------------------------------------------------- ALERT: Exploiting Web Applications- A Step-by-Step Attack Analysis Learn why 70% of today's successful hacks involve Web Application attacks such as: SQL Injection, XSS, Cookie Manipulation and Parameter Manipulation. http://www.spidynamics.com/mktg/webappsecurity71
-- Patrick S. Harper | CISSP MCSE patrick () internetsecurityguru com www.internetsecurityguru.com "If we aren't supposed to eat animals, why are they made of meat?" ----------------------------------------------------------- ALERT: Exploiting Web Applications- A Step-by-Step Attack Analysis Learn why 70% of today's successful hacks involve Web Application attacks such as: SQL Injection, XSS, Cookie Manipulation and Parameter Manipulation. http://www.spidynamics.com/mktg/webappsecurity71
Current thread:
- Working with/Setting up IDS (Papers) David Vertie (Mar 26)
- Re: Working with/Setting up IDS (Papers) Patrick S. Harper (Mar 28)