Hello. In Snort, how a digital signature is actually created
for the authentication purpose and thereby provides
intrusion detection as well as prevention. How the software
for IDS/IPS comes to know regarding the
threat/vulnerability using digital signature ? Whether any
specific language or programming is used or not.
Answer Posted / dj
NEED AN ANSWER
| Is This Answer Correct ? | 1 Yes | 3 No |
Post New Answer View All Answers
What Is Encryption?
How can we use quantum properties in cryptography ?
What is nonlinear cryptography?
What is public-key cryptography ?
How to I prevent other users from using Kryptel (Silver Key)?
What is luc?
What is an encryption "key" and what is the importance of key length?
What information can be obtained from encrypted file?
What is are "proprietary" and "public" cryptographic algorithms?
What are "stream" and "block" ciphers?
Actual role of cryptography is data security .Explain with real world example?
What is the rabin signature scheme?
What is private key cryptography and how we compare it with public key cryptography?
What is exhaustive key search ?
whats cryptanalysis?