Snort. A practical NIDS



Similar documents
Introduction to Intrusion Detection and Snort p. 1 What is Intrusion Detection? p. 5 Some Definitions p. 6 Where IDS Should be Placed in Network

SNORT R Users Manual The Snort Project

Intrusion Detection System

Configuring Snort as a Firewall on Windows 7 Environment

EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS

Configuring Snort as a Firewall on Windows 7 Environment

From Network Security To Content Filtering

IDS / IPS. James E. Thiel S.W.A.T.

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Intrusion Detection Systems with Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Network Defense Tools

Linux Networking Basics

Intrusion Detection Systems (IDS)

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

Intrusion Detections Systems

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Linux Network Security

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

IDS and Penetration Testing Lab III Snort Lab

nmap, nessus, and snort Vulnerability Analysis & Intrusion Detection

Lab Objectives & Turn In

Course Title: Penetration Testing: Security Analysis

How To Set Up A Honeynet On A Linux Computer

Network Security, ISA 656, Angelos Stavrou. Snort Lab

Network Intrusion Analysis (Hands-on)

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

PERFORMANCE ANALYSIS OF INTRUSION DETECTION SYSTEMS

Signature Based Intrusion Detection System Using SNORT

Intrusion Detection in AlienVault

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Linux Routers and Community Networks

General Terms. Keywords 1. INTRODUCTION 2. RELATED WORKS

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

System Log Setup (RTA1025W Rev2)

How to Make the Client IP Address Available to the Back-end Server

Firestorm Network Intrusion Detection System

BF2CC Daemon Linux Installation Guide

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Netflow Collection with AlienVault Alienvault 2013

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Dynamic Rule Based Traffic Analysis in NIDS

Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID

Snort ids. Alert (file) Fig. 1 Working of Snort

Web-Based Configuration Manual System Report. Table of Contents

TECHNICAL NOTE INSTALLING AND CONFIGURING ALE USING A CLI. Installing the Adaptive Log Exporter

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

Working with Snort Rules

Intrusion Detection and Prevention

+ iptables. packet filtering && firewall

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Intrusion Detection Systems

Network Security Management

Lab Configure Intrusion Prevention on the PIX Security Appliance

CS Computer and Network Security: Firewalls

Cisco Setting Up PIX Syslog

Undergraduate Course Syllabus

IP Filter/Firewall Setup

Project Artillery Active Honeypotting. Dave Kennedy Founder, Principal Security Consultant

Packet filtering with Linux

1. INTRODUCTION 2. CLASSIFICATION OF INTRUSION DETECTION SYSTEMS

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Linux Firewalls (Ubuntu IPTables) II

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Case Study 2 SPR500 Fall 2009

PROFESSIONAL SECURITY SYSTEMS

Network Management and Debugging. Jing Zhou

Network Traffic Analysis

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

RSA Security Analytics

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

CS Computer and Network Security: Firewalls

IP Subnetting and Addressing

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Network Security EDA /2012. Laboratory assignment 4. Revision A/576, :13:02Z

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Second-generation (GenII) honeypots

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

ipta iptables Log Analyzer Anders Sikvall ichimusai.org

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

Configuring Syslog Server on Cisco Routers with Cisco SDM

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

File Integrity Monitor Windows Edition Version 4.0

enetworks TM Using the Syslog Feature C.1 Configuring the Syslog Feature

Cisco Configuring Commonly Used IP ACLs

Netfilter. GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic. January 2008

FortiGate IPS Guide. Intrusion Prevention System Guide. Version November

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Linux MDS Firewall Supplement

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM

FIREWALLS & CBAC. philip.heimer@hh.se

Transcription:

Snort A practical NIDS

What is SNORT Snort is a packet logger/analyzer, which can be used to implement a NIDS. It can based be used in 4 modes: Sniffer mode Packet Logger mode Network Intrusion Detection System (NIDS) mode Inline Mode

Example: logging packets The command snort -dev -l./log -h 192.168.1.0/24 results in packets being logged. Flag -d tells to log the data, as well as header portion of packets Flag -v is visual, causing Snort to display information in the screen Flag -e tells to log extended header information (e.g., data link layer headers) Flag -l indicates a location (directory) to use for logging purposes (subdirectory log of current directory in the above example) Flag -h indicates how to create subdirectories. Each packet will be stored in a log file with a name that matches either source or destination addresses in a datagram. By specifying the prefix 192.168.1.x, it indicates you want the packets logged under the local host in the communication

Using binary mode storage Alternatively, you can use the compact binary storage form to store packets snort -l./log -b This causes Snort to log all packets in binary form (tcpdump storage). No flags are needed, because all the packet is stored. You can then read them back in playback mode---useful to experiment with new rules../snort -dv -r packet.log You can also playback only packets of a particular type./snort -dvr packet.log icmp

NIDS mode NIDS mode enables modification of Snort basic behavior (i.e., log everything) and have it first apply a set of rules, taking the appropriate action when a packet matches the rule. snort -dev -l./log -h 192.168.1.0/24 -c snort.conf Results in Snort logging only packets that matches the rules specified in snort.conf Don t use -v or -e when using as NIDS, for the sake of speed (otherwise Snort may loose packets)

Alerts in NIDS mode Using the flag -A will add alerting behavior to Snort -A can be followed by the keywords full (default), fast, unsock, none, console, and cmg. To use syslog for remote logging, of alerts, use the flag -s Example: snort -b -A fast -c snort.conf

Inline Snort Obtain packets from IPTables instead of libpcap and uses Snort rules to instruct IPtables whether to drop or pass packets In order for snort_inline to work properly, you must download and compile the iptables code to include make install-devel. This will install the libipq library that allows snort_inline to interface with iptables. Also, you must build and install LibNet. http://www.iptables.org http://www.packetfactory.net.

Running Snort Inline The QUEUE target should be specified in IPtables for interfacing with Snort iptables -A OUTPUT -p tcp --dport 80 -j QUEUE Then run Snort inline snort_inline -QDc../etc/drop.conf -l /var/log/snort The flags mean: -Q: Obtain input from iptables QUEUE target -D: Run in daemon mode (i.e., continuously in the background) -c: Use the configuration file -l: Use the log file

Snort configuration Snort configuration is highly customizable, in order to achieve high performance and full flexibility of use. config checksum_mode: none, noip, notcp, noicmp, noudp, ip, tcp, udp, icmp, all An important feature of Snort is the use of preprocessors. For instance, the de-fragmentation pre-processor frag3 allows you to use different policies to re-produced the defragmentation policies of various operating systems. Or, you can define your own policy. Similarly, the stream4_reassemble pre-processor enables you to choose your policies with overlapping packets.

Detecting port scans sfportscan processor Detects NMAP-style port scans, as well as decoy and distributed port scans Can detect port sweeps as well as port scans Can be tuned for sensitivity/ accuracy

Application layer preprocessors Telnet_decode RPC_decode HTTP_inspect Apache profile IIS profile many customizable options