Evaluating Network Intrusion Detection Signatures, Part Two

by Karen Kent Frederick Sept. 1, 2017 via Symantec

In this series of articles, we present recommendations that will help readers to evaluate the quality of network intrusion detection (NID) signatures, either through hands-on testing or through careful consideration of third-party product reviews and comparisons. The first installment discussed some of the basics of evaluating NID signature quality, as well selecting attacks to be used in testing. This article will conclude the discussion on criteria for choosing attacks and then provide recommendations for generating attacks and creating a good testing environment. We begin by discussing some methods of acquiring attacks and attack traffic.

https://www.symantec.com/connect/articles/evaluating-network-intrusion-detection-signatures-part-two