The Power of SNORT SNORT Update



Similar documents
Deployment of Snort IDS in SIP based VoIP environments

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

EZ Snort Rules Find the Truffles, Leave the Dirt. David J. Bianco Vorant Network Security, Inc. 2006, Vorant Network Security, Inc.

Intrusion Detection in AlienVault

Configuring Snort as a Firewall on Windows 7 Environment

From Network Security To Content Filtering

Configuring Snort as a Firewall on Windows 7 Environment

SourceFireNext-Generation IPS

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

Managing Latency in IPS Networks

Network Defense Tools

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

IDS / IPS. James E. Thiel S.W.A.T.

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Introducing IBM s Advanced Threat Protection Platform

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

PROFESSIONAL SECURITY SYSTEMS

Firewalls, IDS and IPS

Sourcefire Next-Generation IPS

Flow Analysis Versus Packet Analysis. What Should You Choose?

Firewall Defaults and Some Basic Rules

TS-301 Case Project Shaun DeRosa

Introduction to Intrusion Detection and Snort p. 1 What is Intrusion Detection? p. 5 Some Definitions p. 6 Where IDS Should be Placed in Network

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Basic & Advanced Administration for Citrix NetScaler 9.2

Architecture Overview

Suricata IDS. What is it and how to enable it

Intro to Firewalls. Summary

Next-Generation Firewalls: Critical to SMB Network Security

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Solution of Exercise Sheet 5

Implementing Cisco IOS Network Security

Steelcape Product Overview and Functional Description

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Course Title: Penetration Testing: Security Analysis

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Chapter 15. Firewalls, IDS and IPS

Safe network analysis

Content-ID. Content-ID URLS THREATS DATA

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Using Palo Alto Networks to Protect the Datacenter

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

McAfee Network Security Platform 8.2

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Edge Configuration Series Reporting Overview

Securing Cisco Network Devices (SND)

Introduction of Intrusion Detection Systems

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Barracuda Intrusion Detection and Prevention System

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Networking for Caribbean Development

Applications erode the secure network How can malware be stopped?

Analysis of Network Packets. C DAC Bangalore Electronics City

Securing Networks with PIX and ASA

Intrusion Detections Systems

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

GoToMyPC Corporate Advanced Firewall Support Features

Protecting Your Organisation from Targeted Cyber Intrusion

The following topics describe how to manage policies on the Management Center:

Sourcefire Next-Generation IPS

Firestorm Network Intrusion Detection System

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

nmap, nessus, and snort Vulnerability Analysis & Intrusion Detection

IINS Implementing Cisco Network Security 3.0 (IINS)

Firewalls and Intrusion Detection

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Description: Objective: Attending students will learn:

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Secure Networks for Process Control

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Networking and High Availability

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Secure Software Programming and Vulnerability Analysis

CS 356 Lecture 16 Denial of Service. Spring 2013

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Yahoo Attack. Is DDoS a Real Problem?

Lab exercise: Working with Wireshark and Snort for Intrusion Detection

POLIWALL: AHEAD OF THE FIREWALL

ThreatSTOP Technology Overview

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration

Intrusion Detection Systems (IDS)

Application DDoS Mitigation

Transcription:

The Power of SNORT SNORT Update Jean-Paul Kerouanton 11 th May 2010

2 Leveraging the Snort Brand

The Power SNORT = The Power of Open Source The SNORT- Universe AMAZON - +100 items GOOGLE +3.700.000 hits Global base of skilled security professionals well trained Sourcefire VRT is augmented by the resources of the community giving customers the world s largest threat response team. 3

Snort and more. Open Source SNORT CLAMAV OfficeCat Deamonlogger 4

A very nice pig.. Best of Both Worlds Open Source Community + Sourcefire Development 5

6 In different suites.

6 In different suites.

7

7 How it all started.

7 How it all started.

How it all started. Marty invented SNORT.Back in Dec 1998 Originally as a kind of better Sniffer Got quick huge recognition as IDS Participated successful in tests/challenges with commercial products Customer demand for commercial solution increased Sourcefire was founded 2001 Martin Roesch ranks amongst top 100 IT influencers 7

SNORT.ORG Free access to SNORT Engine and Rules +3.000.000 downloads +300.000 REGISTERED user Subscribe or not to subscribe, that is the questions.. Subscription is virtually- cheap (personal: 29,99 USD/year; internal use, +6 sensors: 399,99 USD per year) Regular updates, much faster With no subscriptions updates delayed (30 days) Able to contribute Rich information exchange Maintained by a special group @Sourcefire (around VRT) 8

9

9 SNORT and Sourcefire

SNORT and Sourcefire Snort and Sourcefire: 2010 in its 10th wedding anniversary BTW: 29% of spouses in US getting divorced prior 7 years being married ;-) SnortSP (Snort Security Platform) will help Snort to maintain its dominance for the next 10 years! Sourcefire owns 100% of the SnortSP code Provides a common infrastructure for processing and decoding traffic among multiple 3D applications ( engines ) Significant benefits for 3D customers, open source users SnortSP was the first major milestone toward Snort 3.0 and our 3D System architecture 9

10

10 SNORT rules are open. Does this hurt?

SNORT rules are open. Does this hurt? No security by obscurity Everybody can write its own Users will see what he gets Business proven Robust Security is proven by millions of people 10

11

SNORT and VRT the lead in Cybersecurity Deep Snort knowledge Responsibilities include: Publishing new Snort rules, SEU s & VDB s Publishing new ClamAV signatures Development of the ClamAV Engine Threat Research 100 Percent MS Coverage Coverage for All Adobe 0-Days Covered 10 Critical Rated Adobe Bugs No one else has coverage for these. ICSA Certified Best Overall Detection at NSS 900 Vulnerabilities covered with 890 rules in 2009 11

My concern right now isn t what I m being attacked with, its finding what I need to defend Sourcefire customer 12

But what are we protecting? My concern right now isn t what I m being attacked with, its finding what I need to defend Sourcefire customer 12

13

Passive Discovery Network fingerprinting Real-time, not periodic Zero impact Impossible to evade 13

14

Enforcing network configurations Real-time Network Map Configuration Baseline Compliance Map Real-time Comparison Compliance system Actionable Event 14

What s New in Snort 2.8.5

Multiple Configurations Allows for multiple snort.confs to be used by one Snort Process Configuration selected by VLAN or IP Address Prioritized by VLAN, Destination IP, Source IP Allows single Snort instance to monitor different networks with rules specific to each network 16

Multiple Configurations (cont.) Configuration Binding Main snort.conf is default configuration Specific path to network specific snort.conf and VLAN or subnet via config binding option in main snort.conf Can use different rule variables across configurations Rule option (content, byte_test, pcre, etc) must be the same for each rule sid Rule src/dst IP address & port can differ Rule action (alert, drop, etc) can differ 25

Multiple Configurations (cont.) Can use different filter settings across configurations Suppression, Event Filters, Rate Filters Can use different preprocessor settings across configurations Preprocessor configurations can differ Memory settings (memcaps, tcp limits, etc) used from the default configuration Output plugins (unified2, etc) are global and specified in default configuration 26

Rate Based Attack Prevention New/Updated Filters Rate Filters Limit connections & connection attempts per host Change rule action when a rate is reached Example: SYN Floods Detection Filters Use to detect attacks where a limit/rate is required Drop rule will not drop traffic until rate is met Example: DNS Spoofing attacks Output/Event Filters Limit the number of alerts Snort generates 27

Rate Based Attack Prevention (cont.) Rate Filters New keyword rate_filter Change rule action when a rate is reached Pass to Alert Alert to Drop Based on rule s GID & SID, use special ones for 135:1 Connection Attempts (SYN Attacks) 135:2 Simultaneous open connections Can specify multiple rate_filters per GID & SID pair Use track by_src or by_dst options to control specific sides of the connection Use apply_to to control specific hosts/networks 28

Rate Based Attack Prevention (cont.) Detection Filters New rule option detection_filter Replaces in-rule thresholds and restricts the number of times a rule actually alerts Considered part of the rule, just the same as content, byte_test, etc. Used to detect attacks where a rule must match multiple times in a time period before alerting 29

Rate Based Attack Prevention (cont.) Output Filters New keyword event_filter Equivalent to the old threshold keyword Same syntax Changed to eliminate confusion between the filter and its type (threshold, limit, both) Example: event_filter type threshold threshold keyword still supported for backwards compatibility, will be removed in a future release Reduces the number of alerts Snort generates No changes to suppression keyword 30

SSH Preprocessor No Longer experimental What does this preprocessor do? Decode SSH connections Identifies certin classes of attacks on SSH servers SecureCRT SSH Client Buffer Overflow attack Catalyst Exploit Challenge Response Overflow SSHv1 CRC32 Identifies encrypted sessions for Snort to ignore Makes snort more efficient 31

Configuration Update/SigHUP Allows for full update to configuration without termination of Snort Continued inspection while new configuration is being loaded Improved startup/shutdown speed to allow continued flow of network traffic when Snort is deployed inline 32

Performance Improvements Leverages knowledge gained from SnortSP Recognized internal packet structure Makes packet decoding faster Results in improved throughput, reduced CPU usage Faster loading and use of shared libraries Side-effect, cannot use Snort 2.8.5 with 2.8.4 shared rules or preprocessors (.so/dll) Improvements of performance of some.so rules 33

What s New in Snort 2.8.6

Generally Improvements to Pattern Matching efficiency Improved HTTP response processing Improved detection of file-based attacks against client applications Web Browser MS Office Others Better ways to detect credit card numbers, social security numbers, and other personal information 34

Improved Fast Pattern Matcher Improved memory usage of Snort Engine. Fast pattern matcher automatically measures memory and more efficiently identifies rules likely to match packets. Increase around 10 % the performance. 34

Http Detection Enhancements Analyze more in depth http traffic New Options for http pre-processor Compressed gzip inspection Cookies New Keywords : http_encode and file_data New arguments for Content and pcre keywords 34

Sensitive Data Detection Detect and alert on sensitive data leaks Can detect data as Social Security numbers, Credit Card... Detection in ASCII text Known as Baby-DLP 34

Next?

Snort Roadmap Q2 Q3 Q4 Q1 Q2 Q3 Product Line 2010 2010 2010 2011 2011 2011 Snort 2.8.6 2.9 Planned Features Sensitive Data Preprocessor ( Baby DLP ) Client-Side Improvements (gzip decoding, file pointers, etc.) Pattern Matching Performance Enhancement Targeted Features Stream Reassembler Update MIME/Base64 Email Decoding Improved Web Proxy Support Research Areas Snort 3.0 Detection Engine 34

33