Intrusion Detection System

Published on March 2017 | Categories: Documents | Downloads: 34 | Comments: 0 | Views: 273
of 10
Download PDF   Embed   Report

Comments

Content

Intrusion Detection System
Snort

What is Snort?


Free and Open Source Intrusion Detection System
Monitor network traffic  Scan for protocol anomalies  Scan for packet payload signatures that represent potential attacks, worms, and unusual activities


Monitoring consoles available  Can be configured as an IPS


Where should it be placed?


Snort Tap Placement


Natural Choke Points
 Areas

where the network topology creates a single traffic path due to logical topology of the network

 

Artificial Choke Points
 Exist

Intranet Trust/Un-trust Zone Boundaries
 Similar

to Natural Choke Points but are intranetwork

How does it work?


Snort Rules
Primarily a signature based detection engine  Example:

 alert

tcp $TELNET_SERVERS 23 -> $EXTERNAL_NET any (msg:"TELNET root login"; flow:from_server,established; content:"login|3A| root"; classtype:suspicious-login; sid:719; rev:7;)



While indicative of attacks, leaks, and protocol violations, false positives are generated

How to monitor?


BASE (Basic Analysis and Security Engine)
Number of unique alerts  Alerts ordered by category  Today’s alert  Most frequent src/dest ports


BASE – Main Screen

BASE – Policy Violations

Worm Propagation Analysis Example





 

Multiple Layers of Antivirus checkers in place: workstations, servers, email-stores, and email gateways Most active updating checkers gets new signatures every 15 minutes On September 2005, 3 bagle variants were released quickly AV companies alerted us, but workstations were affected Which of the 5000 workstations were affected?

Worm Propagation Analysis Example


alert tcp any any -> any any (msg:"Potential Bagle Propagation"; content:"osa6.gif"; classtype:policyviolation; sid:1000003; rev:3;)

Conclusion
Snort provides another tool in the toolkit and can help provide information about exactly who’s talking to who on the network  “Security is a process, not a product”


Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close