Security Onion. Peel Back the Layers of Your Network in Minutes. Doug Burks
|
|
|
- Roberta Hutchinson
- 10 years ago
- Views:
Transcription
1 Security Onion Peel Back the Layers of Your Network in Minutes Doug Burks
2 tcpdump -nnai eth1 -s0 grep -A5 "Doug Burks" About Doug Burks: Christian, husband, father Corporate Incident Handler for Mandiant SANS GSE and Community Instructor President of Greater Augusta ISSA Founder and lead developer of Security Onion
3 What is Security Onion? Security Onion is a FREE Linux distro for: intrusion detection network security monitoring log management
4 What data does it give me? Flow data from Argus, Bro, and PRADS Alert data NIDS alerts from Snort/Suricata HIDS alerts from OSSEC Syslog data received by syslog-ng or sniffed by Bro Asset data from Bro and PRADS Transaction data http/ftp/dns/ssl/other logs from Bro Full content data from netsniff-ng
5 Does it scale? Big Onions 64-bit Big Traffic PF_RING Big Data ELSA
6 How many Security Onion users are there? Over 100,000 ISO downloads from Sourceforge! Security Onion ISO (based on Ubuntu 10.04) - 37,777 Security Onion ISO (released 12/31/2012) - 34,573 Security Onion ISO (released 6/10/2013) - 7,511 Security Onion ISO (released 7/25/2013) - 6,396 Security Onion ISO (released 9/14/2013) - 15,824???? From BitTorrent???? Ubuntu/Kubuntu/Lubuntu + Security Onion PPA
7 What has changed since last FloCon? Updated just about every piece of software, including: Snort, Suricata, Bro, PF_RING, PRADS, ELSA, Snorby, Squert, CapMe, NetworkMiner Fixed lots o bugs! Moved to a standard argus.conf to allow more Argus customization Added more knobs for tuning: Enable/disable sensor processes Adjustable netsniff-ng (full packet capture) settings Adjustable log purge threshold Added OnionSalt to manage lots o onions
8 What does it look like?
9 Answer a few simple questions
10 Snorby
11 Pivot to pcap from Snorby
12 CapME
13 Squert web interface
14 Sguil client
15 Pivot to pcap from Sguil
16 NetworkMiner There s gold in them thar PCAPs!
17 ELSA
18 Pivot to pcap from ELSA
19 Ooh shiny
20 Case Study Was an EXE downloaded? Was it executed? Was the computer compromised? Was there any data exfil?
21 Bro Flow
22 Who did this IP talk to?
23 And over what ports?
24 What all do we know about the source?
25 Found an EXE
26 IP address in EXE
27 Traffic to hardcoded IP address
28 Interesting FTP Activity
29 Interesting FTP Activity
30 Interesting FTP Activity - RAR
31 Extract the RAR
32 What s in the RAR?
33 Future of Security Onion More documentation Best practices Tuning Web interface for administration More/better integration with Argus? Add Silk? Others?
34 Where do we go now? Updates are announced here and it also has the following links: Download/Install FAQ Mailing Lists IRC #securityonion on Security Onion classes throughout 2014!
Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory
Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory A Little Context! The Five Golden Principles of Security! Know your system! Principle
Network Security Monitoring
CEENET/GEANT Security Workshop Sofia, 2014 Network Security Monitoring An Introduction to the world of Intrusion Detection Systems Irvin Homem [email protected] Stockholm University Who am I? Of Indian and
S N O R T I D S B L A S T C O U R S E
S N O R T I D S B L A S T C O U R S E General Description In this course, we will use the Security Onion operating system. Security Onion is based on Ubuntu Linux distro. It contains the Snort IDS, Suricata,
USE HONEYPOTS TO KNOW YOUR ENEMIES
USE HONEYPOTS TO KNOW YOUR ENEMIES SHERIF MOUSA (EG-CERT) 9 MAY 2012 WHAT ARE WE GOING TO TALK ABOUT? What exactly happens on the end of your Internet connection. Open Source tools to set up your own Honeypot
Berkley Packet Filters and Open Source Tools. a tranched approach to packet capture analysis at today s network speeds
Berkley Packet Filters and Open Source Tools a tranched approach to packet capture analysis at today s network speeds 1 Agenda Packet Capture overview Bro description Security Onion description The problem
Missing the Obvious: Network Security Monitoring for ICS
Missing the Obvious: Network Security Monitoring for ICS If ICS are so vulnerable, why haven t we seen more attacks? We aren t looking! Two Key Reasons Intent Visibility Intent Why are targeted attacks
Network Security Monitoring
Network Security Coleman Kane [email protected] September 24, 2014 Cyber Defense Overview Network Security 1 / 23 Passive Passive 2 Alert Alert Passive monitoring analyzes traffic with the intention
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell Mandiant, a FireEye company [2014 SANS European ICS Summit] About me Currently: Principal Consultant on Mandiant s Industrial
Network Intrusion Analysis (Hands-on)
Network Intrusion Analysis (Hands-on) TCP/IP protocol suite is the core of the Internet and it is vital to understand how it works together, its strengths and weaknesses and how it can be used to detect
What happens when you use nmap or a fuzzer on an ICS?
NSM 101 for ICS About me Chris Sistrunk, PE Electrical Engineer Sr. ICS Security Consultant Control system security assessments ICS Village (DEF CON & RSA Conference) Entergy (11+ years) SCADA Engineer
Compliance Solu.ons with a Budget in Mind
Compliance Solu.ons with a Budget in Mind complex, expensive PCI requirements tools to aid in mee7ng these requirements These tools will cost you exactly Open Source / Free Caveats May require more technical
Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Logging
Dynamic Rule Based Traffic Analysis in NIDS
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 International Research Publications House http://www. irphouse.com Dynamic Rule Based
BEGINNER S GUIDE to. Open Source Intrusion Detection Tools. www.alienvault.com
BEGINNER S GUIDE to Open Source Intrusion Detection Tools www.alienvault.com IDS Basics If you aren t already running network IDS, you should be. There are two types of Network IDS: Signature Detection
NETWORK SECURITY. Scott Hand. Melanie Rich-Wittrig. Enrique Jimenez
NETWORK SECURITY Scott Hand Melanie Rich-Wittrig Enrique Jimenez Chapter 2 In Which Firewalls Are Erected, Packets Are Snorted, And Pwnage Denied TOPICS COVERED Host Software Firewalls iptables Network
When prevention FAILS: Extending IR and Digital Forensics to the corporate network. Ismael Valenzuela
When prevention FAILS: Extending IR and Digital Forensics to the corporate network Ismael Valenzuela # whoami Global ICT Security Manager at isoft, a CSC company SANS Community Instructor for Intrusion
Wireshark Deep packet inspection with Wireshark
Wireshark Deep packet inspection with Wireshark Wireshark is a free and open-source packet analyzer. It is commonly used to troubleshoot network issues and analysis. Originally named Ethereal, in May 2006
disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM
disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM INTRODUCTION Snort is an open source network Intrusion Detection and Prevention Systems (IDS/IPS) developed by Martin Roesch capable
Intrusion Detection Systems. Darren R. Davis Student Computing Labs
Intrusion Detection Systems Darren R. Davis Student Computing Labs Overview Intrusion Detection What is it? Why do I need it? How do I do it? Intrusion Detection Software Network based Host based Intrusion
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS
EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS Manu Bansal Assistant Professor Department of IT University Institute of Engineering & Technology Panjab University,
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan
An Open Source IPS IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan Introduction IPS or Intrusion Prevention System Uses a NIDS or Network Intrusion Detection System Includes
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Network Security Monitoring: Beyond Intrusion Detection. By: rewtninja
Netwrk Security Mnitring: Beynd Intrusin Detectin By: rewtninja Agenda Overview f NSM Benefits f NSM NSM vs IDS Limitatins f NSM Free slutins fr implementing NSM DEMO Whami? Security enthusiast SecOps
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Network Security Monitoring
Network Security Monitoring Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor
Intrusion Detection Architecture Utilizing Graphics Processors
Acta Informatica Pragensia 1(1), 2012, 50 59, DOI: 10.18267/j.aip.5 Section: Online: aip.vse.cz Peer-reviewed papers Intrusion Detection Architecture Utilizing Graphics Processors Liberios Vokorokos 1,
Intelligence Driven Intrusion Detection
Intelligence Driven Intrusion Detection Matthias Wübbeling: [email protected] Arnold Sykosch: [email protected] Friedrich-Wilhelms-Universität Bonn: Working Group IT Security Fraunhofer
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Snort. A practical NIDS
Snort A practical NIDS What is SNORT Snort is a packet logger/analyzer, which can be used to implement a NIDS. It can based be used in 4 modes: Sniffer mode Packet Logger mode Network Intrusion Detection
Bro at 10 Gps: Current Testing and Plans
U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic
Open Source in Government: Delivering Network Security, Flexibility and Interoperability
W H I T E P A P E R Open Source in Government: Delivering Network Security, Flexibility and Interoperability Uncompromising performance. Unmatched flexibility. Introduction Amid a growing emphasis on transparency
Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC
Intrusion Detection and Intrusion Prevention Ed Sale VP of Security Pivot Group, LLC Presentation Goals Describe IDS and IPS Why They Are Important Deployment and Use Major Players The IT Security Camera
Indexing Full Packet Capture Data With Flow
Indexing Full Packet Capture Data With Flow FloCon January 2011 Randy Heins Intelligence Systems Division Overview Full packet capture systems can offer a valuable service provided that they are: Retaining
Early warning for security attacks
Welcome to Early warning for security attacks 2013 Henrik Lund Kramshøj, internet samurai [email protected] http://www.solidonetworks.com c license CC BY 3.0. 2014 Solido Networks, Henrik Lund Kramshøj 1
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Applied Detection and Analysis Using Network Flow Data
Applied Detection and Analysis Using Network Flow Data Chris Sanders and Jason Smith TAP Intel-Based Detection Mandiant, a FireEye Company Chris Sanders Christian & Husband Kentuckian and South Carolinian
Network Monitoring for Cyber Security
Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions
THE PRACTICE OF NETWORK SECURITY MONITORING
THE PRACTICE OF NETWORK SECURITY MONITORING U N D E R S T A N D I N G A N D INCIDENT DETECTION RESPONSE RICHARD BEJTLICH An invaluable resource for anyone detecting and responding to security breaches
Network Monitoring using MMT:
Network Monitoring using MMT: An application based on the User-Agent field in HTTP headers Vinh Hoa LA Ɨ Raul FUENTES Ɨ PhD Student Prof. Ana CAVALLI Ɨ Ƭ Supervisor Ɨ Telecom SudParis, IMT Ƭ Montimage
COUNTERSNIPE WWW.COUNTERSNIPE.COM
COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0 CounterSnipe s version 7.0 is their next major release and includes a completely new IDS/IPS leveraging high performance scalability
Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security
Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an
The principle of Network Security Monitoring[NSM] C.S.Lee[[email protected]] http://geek00l.blogspot.com
The principle of Network Security Monitoring[NSM] C.S.Lee[[email protected]] http://geek00l.blogspot.com Claim: Before I proceed, I would like to make it clear about the topic I gonna deliver, I'm not
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Some Tools for Computer Security Incident Response Team (CSIRT)
Some Tools for Computer Security Incident Response Team (CSIRT) AfNOG 12 30 th May 2011 10 th June 2011 Tanzania By Marcus K. G. Adomey Overview Some Unix Commands Some Selected Tools Snort AirSnort hping
Traffic Monitoring : Experience
Traffic Monitoring : Experience Objectives Lebah Net To understand who and/or what the threats are To understand attacker operation Originating Host Motives (purpose of access) Tools and Techniques Who
Security Power Tools
Security Power Tools nmap: Network Port Scanner nmap is a network port scanner. Its main function is to check a set of target hosts to see which TCP and UDP ports have servers listening on them. Since
Vuurmuur - iptables manager
Vuurmuur - iptables manager Victor Julien July 7, 2014 Victor Julien Vuurmuur - iptables manager July 7, 2014 1 / 23 About me Vuurmuur founder and lead developer of Vuurmuur Open Source Suricata IDS/IPS
The Ultra-Secure Network Architecture
The Ultra-Secure Network Architecture You almost cannot open a newspaper, news magazine, a news Web site or your electronic mail without finding out that another company has suffer a security breach and
How To Protect Your Network From Attack From A Hacker On A University Server
Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales [email protected] Cell Phone 215-292-4473 www.niksun.com
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
Security Monitoring and Architectures for Security Logging
Security Monitoring and Architectures for Security Logging Christer Andersson 15 December 2009 1 December 2008 Introduction to myself Christer Andersson Information Security Consultant at Combitech Karlstad
APPLICATION NOTE. How to build pylon applications for ARM
APPLICATION NOTE Version: 01 Language: 000 (English) Release Date: 31 January 2014 Application Note Table of Contents 1 Introduction... 2 2 Steps... 2 1 Introduction This document explains how pylon applications
An Overview of the Bro Intrusion Detection System
An Overview of the Bro Intrusion Detection System Brian L. Tierney, Vern Paxson, James Rothfuss Lawrence Berkeley National Laboratory Typical Approach: Firewall with default deny policy A blocking router
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
6.0. Getting Started Guide
6.0 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Intrusion Detection Systems
Intrusion Detection Systems Intrusion Detection Systems Intrusion Detection Systems: Overview IDS Acronyms & Definition Components Recognition & Response Security Interoperability & Cooperation HIDS NIDS
Network Security Monitoring Theory and Practice
Network Security Monitoring Theory and Practice Michael Boman IT Security Researcher and Developer [email protected] http://proxy.11a.nu About Me Born in Sweden, been working in Singapore for the last 6 years
Exploratory Data Analysis of Network Traffic in Industrial Control Systems
Exploratory Data Analysis of Network Traffic in Industrial Control Systems Carlos Ortega, Anvit Srivastav, Priya Ahuja, Michael Christian, Alvaro Cardenas August 21, 2014 Abstract In this paper we have
Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems
Security Tools (SecTools) UCR's implementationn of a security dashboard (nominally designated SecTools) is a wonderfully flexible and useful framework for viewing current security incidents and for gaining
Building a Security Operations Center Lessons Learned. active threat protection
Building a Security Operations Center Lessons Learned active threat protection Yves Beretta October 8, 2013 INTRODUCTION 10/10/2013 Building a Security Operations Center Lessons Learned Slide 2 Yves Beretta
Network Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
The Security Onion Cloud Client
The Security Onion Cloud Client Network Security Monitoring for the Cloud GIAC (GCIA) Gold Certification Author: Advisor: Dennis Distler Abstract With cloud servers continuing to become ever more popular,
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
Open Source Network Security Monitoring With Sguil
Open Source Network Security Monitoring With Sguil David J. Bianco President Vorant Network Security, Inc. [email protected] Table of Contents Intro to Network Security Monitoring (NSM) NSM with Sguil Sguil
Lab 1: Network Devices and Technologies - Capturing Network Traffic
CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of
OSSEC. Intrusion detection and response System and log analysis of Drupal sites and servers
OSSEC Intrusion detection and response System and log analysis of Drupal sites and servers Looked at your logs recently? Client site, November 2012 33.44.55.66 - - [04/Nov/2012:05:48:59 +1100] "POST http://www.example.com/?q=fckeditor%2fxss
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
A Comparison of Four Intrusion Detection Systems for Secure E-Business
A Comparison of Four Intrusion Detection Systems for Secure E-Business C. A. P. Boyce, A. N. Zincir-Heywood Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada {boyce, zincir} @ cs.dal.ca
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Building the Next Generation of Computer Security Professionals. Chris Simpson
Building the Next Generation of Computer Security Professionals Chris Simpson Overview Why teach computer security to high school students Deciding what to teach What I taught Community Support Lessons
Open Source Software for Cyber Operations:
W H I T E P A P E R Open Source Software for Cyber Operations: Delivering Network Security, Flexibility and Interoperability Introduction For the last decade, the use of open source software (OSS) in corporate
Security: Best Practice and Monitoring
Security: Best Practice and Monitoring Romain Wartel Contents Security Best Practice Why it is important How information can be spread Future Security monitoring Patching status monitoring with Yumit Monitoring
SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013
SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and
SECURITY ADVISORY FROM PATTON ELECTRONICS
SECURITY ADVISORY FROM PATTON ELECTRONICS Potential Security Vulnerabilities Identified in Simple Network Management Protocol (SNMP) Revision 1.0 For Public Release March 7, 2002 Last Updated March 7,
Suricata Performance White Paper
Suricata Performance White Paper Jonathan H. Stammler Fall 2011 Contents INTRO... 3 TEST ENVIORMENT... 3 EXPERIMENT... 3 TESTS RESULTS... 3 TEST1... ERROR! BOOKMARK NOT DEFINED. TEST2... 5 TEST3... 7 TEST4...
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
The Bro Network Intrusion Detection System
The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org System Philosophy Bro
OSSEC & OSSIM Unified Open Source Security. [email protected]
OSSEC & OSSIM Unified Open Source Security [email protected] Why OSSIM Open Source SIEM GNU GPL 3.0 Provides threat detec)on capabili8es Monitors network assets Centralizes Informa)on and Management
The HoneyNet Project Scan Of The Month Scan 27
The HoneyNet Project Scan Of The Month Scan 27 23 rd April 2003 Shomiron Das Gupta [email protected] 1.0 Scope This month's challenge is a Windows challenge suitable for both beginning and intermediate
Monitoring Anything and Everything with Nagios. Chris Burgess [email protected] http://www.chrisburgess.com.au
Monitoring Anything and Everything with Nagios Chris Burgess [email protected] http://www.chrisburgess.com.au What We Will Cover What is Nagios? The variety of things Nagios can monitor Why monitoring
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Signature Based Intrusion Detection System Using SNORT
Signature Based Intrusion Detection System Using SNORT Vinod Kumar Research Scholar, School of ICT Gautam Buddha University Dr. Om Prakash Sangwan Faculty, School of ICT Gautam Buddha University ABSTRACT
Using cyber intelligence to detect and localize botnets. ENRICO BRANCA Botconf'13 5-6 December 2013, Nantes, France.
Using cyber intelligence to detect and localize botnets ENRICO BRANCA Botconf'13 5-6 December 2013, Nantes, France. 1 IDEA Create a cyber intelligence system able to: Analyse network communications Detect
