[257] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Ids evaluation

daemon@ATHENA.MIT.EDU (Mark_W_Loveless@smtp.bnr.com)
Mon Jun 12 14:03:36 1995

From: Mark_W_Loveless@smtp.bnr.com
Date: Fri, 09 Jun 95 22:43:44 CST
To: ids@uow.edu.au
Reply-To: ids@uow.edu.au

     Brian - I'd start with my (latest) favorite book, Internet Firewalls 
     and Network Security, from your local nerd bookstore. It covers some 
     stuff like defining a security policy to configuring firewalls. It 
     also has a list of sources you can go to. I'd recommend a system that 
     at least tries to catch an intruder instead of just detect one, 
     Sidewinder by (I can't remember, someone jump in here)? comes to mind, 
     I've heard good things about it. - Mark_W_Loveless@smtp.bnr.com

______________________________ Reply Separator _________________________________
Subject: Ids evaluation
Author:  ids@uow.edu.au at internet
Date:    6/7/95 3:46 PM

I want to buy and install an intrusion detection system.  Our purchasing 
department is telling me that I have to provide a list of specifications for an 
intrusion detection system that can be used to evaluate the features of 
competing products.  Given the little I know of the different approaches that 
IDS systems use, this seems a difficult task.  From time to time I have been 
surprised by the high levels of ability of people posting on this list and I 
think that some of them must have been through this evaluation process before.

Can anyone e-mail me a starting point for evaluation specifications please, or 
point me to a good source?

                                        Brian Smith, DOS Dummy

home help back first fref pref prev next nref lref last post