-
January 9th, 2015, 08:13 PM
#1
Junior Member
Using attack signatures
Hi! My Question: If I want to build my own IDS, I wanted to know If there is a way of using existing attack signatures, if anyone could recommend a guide or manual, or an easier way to do it without using signatures. Also, I would like to know if CAPEC is actually an attack pattern language that can be used for such purposes. Thank you
PS: If I am not at the right place to ask this question I would be grateful if someone could redirect me to a place where I could get some advice.
Similar Threads
-
By SirDice in forum Site Feedback/Questions/Suggestions
Replies: 6
Last Post: August 4th, 2004, 01:09 AM
Tags for this Thread
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|