Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010

Similar documents
EZ Snort Rules Find the Truffles, Leave the Dirt. David J. Bianco Vorant Network Security, Inc. 2006, Vorant Network Security, Inc.

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Introduction to Intrusion Detection and Snort p. 1 What is Intrusion Detection? p. 5 Some Definitions p. 6 Where IDS Should be Placed in Network

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Configuring Snort as a Firewall on Windows 7 Environment

Configuring Snort as a Firewall on Windows 7 Environment

Intrusion Detection Systems (IDS)

A Review on Network Intrusion Detection System Using Open Source Snort

Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection in AlienVault

Signature Based Intrusion Detection System Using SNORT

Snort ids. Alert (file) Fig. 1 Working of Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Network Based Intrusion Detection Using Honey pot Deception

Network Security Management

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Intrusion Detections Systems

Analysis of Host-Based and Network-Based Intrusion Detection System

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Snort. A practical NIDS

Linux Network Security

Course Title: Penetration Testing: Security Analysis

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Connecting your Virtual Machine to the Internet. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

nmap, nessus, and snort Vulnerability Analysis & Intrusion Detection

CTS2134 Introduction to Networking. Module Network Security

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

NETWORK SECURITY (W/LAB) Course Syllabus

Network Security Monitoring

Network Security Demonstration - Snort based IDS Integration -

Working with Snort Rules

Deployment of Snort IDS in SIP based VoIP environments

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM

INTRUSION DETECTION SYSTEMS and Network Security

JAVA FRAMEWORK FOR SIGNATURE BASED NETWORK INTRUSION DETECTION SYSTEM

8. Firewall Design & Implementation

Exercise 7 Network Forensics

Overview - Snort Intrusion Detection System in Cloud Environment

Overview. Firewall Security. Perimeter Security Devices. Routers

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Firewalls and Intrusion Detection

Using Jquery with Snort to Visualize Intrusion

The Power of SNORT SNORT Update

Security Intrusion & Detection. Intrusion Detection Systems (IDSs)

Tk20 Network Infrastructure

Network Defense Tools

CIT 380: Securing Computer Systems

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

Netflow Collection with AlienVault Alienvault 2013

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

New Security Perspective for Virtualized Platforms

Modelling Next Generation Intelligent Network Intrusion Prevention System using M-Key technique

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Firewalls, Tunnels, and Network Intrusion Detection

IDS and Penetration Testing Lab III Snort Lab

Transformation of honeypot raw data into structured data

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Introduction of Intrusion Detection Systems

Network Security, ISA 656, Angelos Stavrou. Snort Lab

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

How To Understand And Understand Cisco Security Specialist (For A Non-Profit)

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Chapter 9 Firewalls and Intrusion Prevention Systems

Intrusion Detection Systems with Snort

Anomaly based Network Intrusion Detection System

Traffic Analysis. CSF: Forensics Cyber-Security. Part II.B. Techniques and Tools: Network Forensics. Fall 2015 Nuno Santos

A Quantitative Approach to Security Monitor Deployment

LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide

Firewall Firewall August, 2003

INTRUSION DETECTION SYSTEM

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Network setup and troubleshooting

Intrusion Detection Architecture Utilizing Graphics Processors

FIREWALLS & CBAC. philip.heimer@hh.se

Lab VI Capturing and monitoring the network traffic

CSCI 4250/6250 Fall 2015 Computer and Networks Security

PROFESSIONAL SECURITY SYSTEMS

Data Analysis Load Balancer

Configuring DHCP Snooping

Transcription:

December 7, 2010

Work Proposal The purpose of this work is: Explain a basic IDS Architecture and Topology Explain a more advanced IDS solution Install SNORT on the FEUP Ubuntu distribution and test some of its features Demonstrate SNORT trying: basic network access connections an external network vulnerability scanner Show how to create simple SNORT rules Provide a step-by-step installation manual to encourage other students to test it

What is Intrusion Detection? Intrusion detection is a set of techniques and methods that are used to detect suspicious activity both at the network and host level. Categoties: signature-based intrusion detection anomaly detectionsystems is primarily a rule-based IDS, however input plug-ins are present to detect anomalies in protocol headers.

www.draw-shapes..de Typical location for an intrusion detection system Internet Intranet Switch Modem Firewall IDS port mirroring example for Cisco Catalyst 6509 or 3750 #configure terminal (config)#monitor session 1 source interface GigabitEthernet x/x (config)#monitor session 1 destination interface GigabitEthernet x/x

www.draw-shapes..de Using 2 NICs - Stealth Interface Internet Intranet Switch Modem Firewall eth0 Private Isolated Network IDS eth1 Management Workstation

www.draw-shapes..de Adopted Solution Internet Intranet FEUP Switch Modem Firewall IDS running in a Virtual Machine Remote WEB Access and Vulnerability Scanner

What s SNORT? SNORT is an open source Network Intrusion Detection System. It s capable of performing real-time traffic analysis and packet logging on IP networks.

SNORT modes can be configured to run in three modes: Sniffer mode Packet Logger mode Network Intrusion Detection System (NIDS) mode

SNORT Components Network Packet Capture Module Packet Decoder Preprocessors Detection Engine Rulesets Logging and Alerting System Output Modules Output Alert or Log files / DB

Integration with other packages Base php Apache ADOdb Barnyard MySQL

Block diagram of a complete network intrusion detection system Intruder tries to attack hosts present on this network sensor captures the intruder s data and stores it in MySQL database using output plug-in MySQL database A user looking at intrusion data collected by through web browser Apache web server with PHP, GD Library

The Rule Heather alert tcp any any -> any any (msg: Sample alert ;) Header contains the following fields Action (log, alert) Protocol (ip, tcp, udp, icmp, any) Src IP & Port Dst IP & Port Direction operator ( ->, <> )

The Rule Heather alert tcp $ EXTERNAL NET any - > 192.168.3.0/24 80 (msg: Sample alert ;) Src or dst IP addresses can be: Variables ($HOME NET) Individual IP addresses CIDR blocks Lists ([192.168.3.12,192.168.3.9]) Ports can be Individual ports Port ranges (80:85, :1024, 1025:)

The Rule Body alert tcp any any -> any any (msg: Sample alert ) The body is usually the complex part Begins and ends with () Series of rule options (keywords, with optional parameters) separated by ;

The Rule Body Options Five types of options Metadata Payload detection Non-payload detection Post-detection Thresholding and suppression

The Rule Body Options - Metadata Metadata options provide snort with information about the rule itself or pass on information to the analyst Examples msg specifies the human-readable alert message reference includes a URL for more info classtype and priority give some idea about the type of attack and the severity of the event sid and rev uniquely identify the rule (including revisions & edits)

The Rule Body Options - Payload Detection Options Look inside the packet payload (not the packet headers) The meat of IDS! There are many options to fit many needs, but start with the basics content looks for a string of bytes nocase modified content, makes it case insensitive offset skips a certain number of bytes before searching pcre allows the use of Perl-compatible regular expressions (support must be compiled in)

Test Rule alert tcp any any <> any 80 (msg: Test web activity ; sid:1000001;)

BASE Screenshot

Prerequisites Pre compiled Modules mysql-server libpcap0.8-dev libmysqlclient16-dev bison flex apache2 libapache2-mod-php5 php5-gd php5-mysql libtool libpcre3-dev php-pear vim ssh g++ (required for the new libdnet) base

Prerequisites cont. Source Code Modules that need to be compiled adodb libdnet barnyard2

The SNORT package The SNORT package is comprised by the following modules: snort daq snort-rules

Configuration Files The following configuration files need some customization described on the attached instructions /etc/php5/apache2/php.ini /etc/snort/snort.conf /etc/snort/barnyard2.conf

Conclusion Very useful exercise. Refresh of IDS and other related networking security concepts Future work: Integrating an additional tool to automatically update firewall rules based on alerts generated by. (like Guardian)

Questions?