K
K
Kakao2012-10-12 14:45:33
Computer networks
Kakao, 2012-10-12 14:45:33

Testing intrusion detection systems?

What means can be used to test intrusion detection systems (both host and network), what and how can be tested so that the systems can be compared with each other based on some parameters?

Answer the question

In order to leave comments, you need to log in

3 answer(s)
S
Sergey, 2012-10-12
@Kakao

Vulnerability scanners, for example. Nessus, nmap, xspider/maxpatrol, IBM Rational appscan, Acunetics and so on.
I would do this: organize several "victims" intentionally with vulnerabilities (honeypot, for example, a vulnerable web application, a vulnerable desktop / server, a vulnerable DBMS, etc.), scan all these targets with a couple of scanners, first without IPS, to remove " cast", then put ipesks in turn, comparing the result from the scanners. Which of the IPs will show the best result (there will be fewer vulnerabilities during scanning), which one is more efficient.
The most difficult thing is to organize this very honeypot correctly.

S
Sicness, 2012-10-12
@Sicness

For example, here is the metasploit manual, in particular the chapter on choosing the victim of experiments.

A
Alexey Lesovsky, 2012-10-13
@lesovsky

need obviously leaky things? maybe there is here

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question