Questions tagged [intrusion-detection]

137 questions
0
votes
1 answer

Multi-threading in IDS

I have to develop an IDS for my college project. java code for the sniffer and the algorithm is available to me. I have to enable it to support 1 GB Ethernet traffic/sec. To do so we plan to incorporate multi-threading and run the code on a dual…
0
votes
1 answer

IDS/IPS functionality via Iptables rule

Does Iptables have IDS/IPS functionality? Linux: Ubuntu 12.04
Ahmet Karakaya
  • 9,899
  • 23
  • 86
  • 141
0
votes
1 answer

Understanding ossec and VMs: does a server perform an agent's work too?

So I have a mac host and some virtual machines. I want to use ossec to monitor my virtual machines and my host, mac OS X lion. (I've already fixed the compliation issue with lion, it compiled). See this I'm having trouble understanding what all the…
Adam Miller
  • 1,756
  • 1
  • 25
  • 44
0
votes
0 answers

Apache restarting itself and website is extremely slow

I have a problem with Apache web server restarting itself, my site is extremely slow on admin panel and FTP and I suspect my site might have been hacked. What are the best ways to see if my site was hacked and to find out who it was? And what best…
-1
votes
1 answer

Implement Intrusion Prevention System from SNORT IDS

I have currently installed Snort 2.9.0.4 on Fedora 14 . The Snort IDS Mode is running perfectly, I want to Implement an IPS from the Snort IDS.. I am completely New to linux environment.
Naresh
  • 1
  • 2
-1
votes
1 answer

Determining the number of clusters for kdd99 dataset using k-means

What is the general convention for number of k, while performing k-means on KDD99 dataset? Three different papers I read have three completely different k (25,20 and 5). I would like to know the general opinion on this, like what should be the range…
-1
votes
1 answer

Ossec nothing returned error

When searching in the Ossec server for the report, it is showing nothing returned (or search expired). What's this error?
Ashik Mohammed
  • 979
  • 1
  • 7
  • 9
-1
votes
1 answer

AWS Linux: illegal intrusion attempts against remote hosts on the Internet. Prevention methods?

I launched a linux instance and did the following. Only 22, 80 and 8080 ports were opened to "everywhere" as inbound rule Only git, ruby, ruby-dev, apache and youtrack was installed only from their original sources or using "yum install"…
-1
votes
2 answers

New Dataset for creating rules for snort IDS

I am currently working on a project "Creating rules for network intrusion detection for snort IDS". snort IDS uses network packet header attributes(e.g. ttl,ip,etc.) for the rules. I am currently using KDD 1999 dataset for rule creation part. But,…
-1
votes
1 answer

How can we train and test a neural network with UNB ISCX benchmark dataset?

I have tried with KDD dataset on my neural net and now I want to extend using ISCX dataset. Some part of this dataset contains the HTTP DOS attacks labelled represents replica of real time network traffic but I couldn't figure out how can I convert…
-1
votes
1 answer

FTP account being hacked but not damage done mystery story

My friend’s webserver has been hacked, but nothing was compromised. Here is my daily Sherlock Holmes story: My friend’s hosting provider sends an email that they 200ed all files on his server because they found compromising FTP log entries. My…
-1
votes
1 answer

How to get TCP state of connection?

I use JPcap to capture packets. I don't know how to get TCP state of connection flags through these captured packet ? Ex: OTH, REJ, RSTO, RSTOS0, RSTR, S0, S1, S2, S3, SF, SH I am building Intrusion detection System.? At present extracting…
Son Vu
  • 19
  • 2
-1
votes
1 answer

Malicious Scripts found in asp.net solution explorer at Runtime

I have found some unknown .php files in Soultion Explorer of asp.net website while running locally. When ever i navigate between pages it dynamically created two files in the name of 1. eval code and 2. jsc3.js.php i understood this is malicious…
lollol
  • 95
  • 1
  • 2
  • 13
-2
votes
1 answer

convert http request to kdd cup data format with 41 parameters

machine learning is done using KDD cup dataset and formed a trained dataset.. Now I have to check the real time request with the trained dataset.. for that I have to convert TCP dump data/or http request to KDD CUP data set format(with 41…
-2
votes
1 answer

deploying intrusion prevention system with custom plugins (snort inline)

I have to deploy a Snort based intrusion prevention system. I am total newbie in this, so any kind of help , references for starters would be highly appreciated. Also snort documentation talks about Honeynet Snort Inline Toolkit, but the available…
Ashish Sharma
  • 1,124
  • 2
  • 24
  • 49
1 2 3
9
10