Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Signature based searching to be used on ids


  • Please log in to reply
3 replies to this topic

#1 anshusoni

anshusoni

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:05 AM

Posted 01 November 2011 - 10:50 PM

Sir, I'm trying to build an INTRUSION DETECTON SYSTEM(IDS) for this purpose i want to search the incoming packets for viruses/worms or any types of malisius program.For this purpose i want to use signature based searching.For this I want

* A signature based searchng algorithm.
* A tutorial on converting a virus files into hash files.
* A good tutorial on TCP/IP UDP packets.

Sir,Please provide me above tutorial and your help and your ideas.

Thank you.

BC AdBot (Login to Remove)

 


#2 groovicus

groovicus

  • Security Colleague
  • 9,963 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Centerville, SD
  • Local time:12:35 PM

Posted 02 November 2011 - 10:52 AM

1. Signature based searching algorithm
2. One does not 'convert' a file into a hash file. One 'applies' a hash to a file.
3. Take your pick.

I don't know anything about your coding capabilities, so I can't really recommend anything else.

#3 anshusoni

anshusoni
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:05 AM

Posted 03 November 2011 - 08:50 AM

Dear Hail Groovicus!
Thanks you!
I am totally new to the field of security,I used to solve problems that was in my test Book.But I'm enthusiastic to build an IDS system.
Please help!

#4 groovicus

groovicus

  • Security Colleague
  • 9,963 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Centerville, SD
  • Local time:12:35 PM

Posted 03 November 2011 - 09:07 AM

Help with what? I gave you links to all sorts of information. What else do you require?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users