Questions tagged [intrusion-detection]

137 questions
2
votes
0 answers

Windows IPS or a way to drop packets

Does anyone know a way to drop packets using Windows, cause I already tried it in many ways. First I tried it with Snort but there is way to get it inline for Windows use. My second solution was to use Suricata but also here I ended up the same way…
2
votes
1 answer

ossec agent.conf updated but not read

I have installed server and agent through binary installation(with preloaded_var.conf).The changes in the agent.conf file on the server is updated on the agent but when I restart the agent the changes in the agent.conf is not running. When I used…
2
votes
1 answer

Testing Snort Rules

I am using the pulledpork to get my rules daily. I want to be able to test these rules and make sure everything is working. Is there anything out there that is up to date and working? I know rules2alert is there but it is vastly unfinished and…
dez
  • 56
  • 1
  • 6
2
votes
1 answer

Snort rules for byte code

I just started to learn how to use Snort today. However, I need a bit of help with my rules setup. I am trying to look for the following code on the network sent to a machine. This machine has snort installed on it (as I installed it now). The…
user3419132
  • 21
  • 1
  • 2
2
votes
2 answers

Bro IDS - detecting DDoS attacks

I need to use BRO IDS to detect DDoS attacks. I installed bro 2.2 from bro.org, then I checked how to do this analysis. Some people suggest me to use synflood.bro to detect DDoS attacks. It is logical. I am trying to use synflood.bro. First, I…
Eray Balkanli
  • 7,752
  • 11
  • 48
  • 82
2
votes
2 answers

How to analyze captured network traffic?

I have some network traffic in the following format: Timestamp | Source | Destination | Protocol | Port | Payload | Payload Size I am trying to determine if there are any known attacks in this traffic. For this, I was looking at some intrusion…
Legend
  • 113,822
  • 119
  • 272
  • 400
2
votes
1 answer

basic and fundamentals on intrusion detection system using neural network

I will take my graduation project next semester , I decide to complete my high degrees studying ,because I'm from low-income people , I want to dive on anything that helps me to do a paper or research or something supports my situation to gain…
Aladdin
  • 221
  • 1
  • 3
  • 11
2
votes
2 answers

dataset of intrusion detection for apache log

FOUND ON : HoneyNet Project. in scan31 and scan34 PHPIDS have a filter rules to detect attack pattern in web access log file. I want to ask how do I know that PHPIDS can detect the attack (xss, sqli, any attack they told that they can detect) in…
1
vote
1 answer

What is an syn error in TCP Protocol?

How to check SYN errors in a connection using JnetPcap (JNETPCAP is java wrapper for libpcap)? Also how to check REJ error in connection? I am building Intrusion detection System. At present extracting attributes of KDD CUP 99 Dataset for live…
Hemang Rami
  • 338
  • 4
  • 14
1
vote
2 answers

Algorithm or api to create Intrusion Detection System inputs

Hello I want to develope Intrusion detection system using neural network. I know there are 41 inputs. ( I know this from the Dataset which I used to train the neural network) . I need help how to capture this 41 inputs in live connection. Please…
Hemang Rami
  • 338
  • 4
  • 14
1
vote
2 answers

Building Intrusion Detection System but from where to begin

I have searched a lot on Intrusion Detection system but now I am confused as now from where should I start. I dont know whether any open source reusable codes exists but I want to make Intrusion Detection and Prevention System with Neural Network.…
Hemang Rami
  • 338
  • 4
  • 14
1
vote
0 answers

Pytorch GRU Trained on one class to Predict Unlabelled Data

I am creating a GRU to predict if data derived from traffic packets from a device is considered safe or anomalous. I plan to do this by training a model only on safe/ normal operating data and then having it check what it considers new unseen…
1
vote
1 answer

Request based intrusion detection in Tomcat

I'm wondering if there is a way to push tomcat requests through a custom class easily (e.g without having to heavily modify the codebase) to do things like running a regex to check for XSS and SQL Injection attacks and deny them/sanitize them based…
Reu
  • 1,257
  • 3
  • 15
  • 30
1
vote
1 answer

How can I protect against inbound malicious website threats on port 80 and 443?

We have a web app that lives on port 80 and 443 on a windows server with IIS. Everything else is locked down. Physical Firewall with VPN. What is the name given to attacks that come through the web ports like this? Are these types of malicious…
Marcus
  • 675
  • 2
  • 8
  • 24
1
vote
1 answer

Building an Intrusion Detection System using fuzzy logic

I want to develop an Intrusion Detection System (IDS) that might be used with one of the KDD datasets. In the present case, my dataset has 42 attributes and more than 4,000,000 rows of data. I am trying to build my IDS using fuzzy association rules,…
1
2
3
9 10