O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of Signatures

All signatures on the Cisco IDS are divided into various categories based on the types of attacks they do pattern matching for. Table 15-4 outlines the various types of signatures available on the Cisco IDS.

Table 15-4. Various Signature Types Divided into the IDS Signature Categories
Signature CategorySignature Types
1000 series—IP signaturesIP options

IP fragmentation

Bad IP packets
2000 series—ICMP signaturesICMP traffic records

Ping sweeps

ICMP attacks
3000 series—TCP signaturesTCP traffic records

TCP port scans

TCP host sweeps

Mail attacks

FTP attacks

Legacy CIDS web attacks (signature IDs 3200 through 3233)

NetBIOS attacks

SYN flood and TCP hijack attacks

TCP applications
4000 series—UDP signaturesUDP traffic records

UDP ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required