cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
518
Views
0
Helpful
1
Replies

Custom Signature Question

Carlos Castillo
Level 1
Level 1

Is there a way to write a custom signature that looks for a IP address making rapid connection attempts to an IPSec termination device trying to brute force a pre-shared key? Would this be something the Anomaly Detection engine would detect?

1 Reply 1

pradeepde
Level 5
Level 5

A Method of detecting malicious network activity by signatures and then implementing a policy for that signature. Secure Hash Algorithm 1. SHA-1 [NIS94c] is a revision to SHA that was published in 1994. SHA is closely modeled after MD4 and produces a 160-bit digest. Because SHA produces a 160-bit digest, it is more resistant to brute-force attacks than 128-bit hashes (such as MD5), but it is slower.

Review Cisco Networking for a $25 gift card