O'Reilly logo

CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) by Earl Carter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Cisco IDS Alarms and Signatures

Upon completion of this chapter, you will be able to perform the following tasks:

  • Identify the major categories of signature engines

  • Explain the different alarming modes

  • Identify the master signature parameters

  • Explain regular expression string matching

  • Identify the Atomic signature engines

  • Identify the Flood signature engines

  • Identify the Service signature engines

  • Identify the State signature engines

  • Identify the Sweep signature engines

To identify malicious activity, Cisco IDS monitors network traffic and generates alarms when traffic matching specific signatures is detected. A signature is basically a description of network traffic that attackers use while conducting network-based attacks. To support a wide ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required