Related articles |
---|
Inverse grep gah@ugcs.caltech.edu (glen herrmannsfeldt) (2011-06-08) |
Re: Inverse grep cfc@shell01.TheWorld.com (Chris F Clark) (2011-06-12) |
Re: Inverse grep dot@dotat.at (Tony Finch) (2011-06-13) |
Re: Inverse grep torbenm@diku.dk (2011-06-14) |
Re: Inverse grep anton@mips.complang.tuwien.ac.at (2011-06-15) |
Re: Inverse grep junyer@gmail.com (Paul Wankadia) (2012-05-28) |
From: | Tony Finch <dot@dotat.at> |
Newsgroups: | comp.compilers |
Date: | 13 Jun 2011 17:48:13 +0100 (BST) |
Organization: | dotat labs |
References: | 11-06-015 11-06-018 |
Keywords: | lex |
Posted-Date: | 14 Jun 2011 19:26:07 EDT |
Chris F Clark <cfc@shell01.TheWorld.com> wrote:
>
>Actually, most "intrusion detection systems" (IDSes, e.g. Snort) and
>virus scanners (e.g. ClamAV) are essentially just that. Given a
>packet, the contents of the packet are inspected to see which if any
>patterns are matched and if so, the relevant pattern [numbers] are
>reported.
Another tool to look at is re2c which can be used with SpamAssassin to
compile its rule regexes.
Tony.
--
f.anthony.n.finch <dot@dotat.at> http://dotat.at/
Faeroes, South-east Iceland: Variable 3 or 4 becoming north or northwest 4 or
5. Moderate. Occasional rain. Moderate or good.
Return to the
comp.compilers page.
Search the
comp.compilers archives again.