DoS can be done in so many different ways that the number of rules
needed to detect it is very large, and often subject to false positives.
For example, see the Emerging Threats ruleset (a recent version can be
found at
http://rules.emergingthreats.net/open/snort-2.9.0/emerging-all.rules )
and look for the string 'dos'. There are lots.
Snort rule writing needs knowledge of the low-level workings of network
communications, TCP, UDP, and ICMP, and often needs knowledge of how the
various protocols work (HTTP, SMTP, SNMP, and so on), plus regular
expression parsing. You should start with already-available rules and
then see if you can modify some of them to do what it is you want to do.
It may be that someone has already written the rules that you need.
On 23.06.2015 10:20, Muhd Haziq wrote:
> How can i alert when someone trying to do dos attack using snort rules
>
--
Mit besten Grüßen
Shane Castle