Chapter 13. Cisco IDS Alarms and Signatures

Upon completion of this chapter, you will be able to perform the following tasks:

  • Identify the major categories of signature engines

  • Explain the different alarming modes

  • Identify the master signature parameters

  • Explain regular expression string matching

  • Identify the Atomic signature engines

  • Identify the Flood signature engines

  • Identify the Service signature engines

  • Identify the State signature engines

  • Identify the Sweep signature engines

To identify malicious activity, Cisco IDS monitors network traffic and generates alarms when traffic matching specific signatures is detected. A signature is basically a description of network traffic that attackers use while conducting network-based attacks. To support a wide ...

Get CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.