snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具

源代码在线查看: 465.txt

软件大小: 771 K
上传用户: lihuitao1987
关键词: snort Snort 2.4 入侵检测
下载地址: 免注册下载 普通下载 VIP

相关代码

				Rule:								--				Sid:				465								--				Summary:				This event is generated when an ICMP echo request is made from a host running the Internet Security Scanner tool.								--				Impact:				Information gathering.  An ICMP echo request can determine if a host is active.								--				Detailed Information:				An ICMP echo request is used by the ping command to elicit an ICMP echo reply from a listening live host.  An echo request that originates from a host running Internet Security Scanner "pinger" software contains a unique payload in the message request.								--				Affected Systems:				All								--				Attack Scenarios:				An attacker may attempt to determine live hosts in a network prior to launching an attack.								--				Ease of Attack:				Simple								--				False Positives:				An ICMP echo request may be used to legimately troubleshoot networking problems.								--				False Negatives:				None known.								--				Corrective Action:				Block inbound ICMP echo requests.								--				Contributors:				Original rule written by Max Vision 				Documented by Steven Alexander				Sourcefire Research Team				Judy Novak 								--				Additional References:				http://www.whitehats.com/info/IDS158								--							

相关资源