SIGNATURES

[ LiB ]  
  1. IDS signature EventActions take one or all of the following actions: TCP reset ( Reset ), IP log ( Log ), block host ( ShunHost ), block connection ( ShunConnection ), or ZERO .

  2. Pre-block ACL Entries that the sensor will place at the beginning of the new ACL before any sensor blocking entries.

  3. Post-block ACL ACL entries that the sensor should place after the sensor blocking entries.

  4. Flood signature engine Used to detect attempts to cause DoS.

  5. Sweep signature engine Used to detect network reconnaissance traffic.

  6. Services signature engine Uses Layers 5, 6, and 7 and are operating systemindependent.

  7. Trojan signature engine Cannot be used to create custom signatures.

  8. Protected parameters Cannot be changed for the default signatures. However, they can be changed for custom signatures.

  9. Required parameters Must be defined for all signatures, both default and custom.

  10. Master parameters Common to most signatures and exist in most signature engines.

  11. Local signature parameters Engine-specific.

  12. Regular expressions searching for the text "Secret" or "secret" use the syntax [Ss]ecret .

  13. The PortRange parameter with a value of ZERO means that all ports will be inspected.

  14. Signature engine Atomic.L3.IP can be used to detect attacks which make use of routing protocols such as Border Gateway Protocol (BGP) and Enhanced Interior Gateway Routing Protocol (EIGRP) at layer 3.

  15. Automatic IP logging captures entire IP packets into a log file. It is not enabled by default and must be configured.

[ LiB ]  


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net