Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.

Slides:



Advertisements
Similar presentations
Snort: Overview Chris Copeland What is an Intrusion Detection System (IDS)? An intrusion detection system is any system which can identify a network.
Advertisements

Lesson 6 Commercial Intrusion Detection Systems. UTSA IS 3523 ID & Incident Response Overview Common Commercial IDS IDS Evaluations Specialized IDS.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention with Snort Dr. Jim Chen, Victor Tsao, Barry Williams, Tokunbo Olojo, John Smet,
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Snort Roy INSA Lab.. Outline What is “ Snort ” ? Working modes How to write snort rules ? Snort plug-ins It ’ s show time.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Chapter 11 - Monitoring Server Performance1 Ch. 11 – Monitoring Server Performance MIS 431 – created Spring 2006.
Introduction to Snort’s Working and configuration file
Honey Inspector Mike Clark Honeynet Project. Honeynet Inspector  Background.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Lesson 19: Configuring Windows Firewall
Information Networking Security and Assurance Lab National Chung Cheng University Snort.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
CIS 193A – Lesson12 Monitoring Tools. CIS 193A – Lesson12 Focus Question What are the common ways of specifying network packets used in tcpdump, wireshark,
Using Argus Audit Trails to Enhance IDS Analysis Jed Haile Nitro Data Systems
Installing Samba Vicki Insixiengmay Jonathan Krieger.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Simulation of IDS by using Activeworx Security Center (ASC) and Snort, MySQL, CommView Presented by Shamsul Wazed & Quazi Rahman School of Computer Science.
The open source network intrusion detection system. Secure System Administration & Certification Ravindra Pendyala.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Penetration Testing Security Analysis and Advanced Tools: Snort.
COEN 252 Computer Forensics
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
Mastering Windows Network Forensics and Investigation Chapter 11: Text-Based Logs.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Tool Names: 1. VISION 2. PASCO 3. GALLETA. Tool 1 VISION.
Tools Menu and Other Concepts Alerts Event Log SLA Management Search Address Space Search Syslog Download NetIIS Standalone Application.
Linux Networking and Security
A powerful network monitoring system
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
An Intrusion Detection System to Monitor Traffic Through the CS Department Christy Jackson, Rick Rossano, & Meredith Whibley April 24, 2000.
Snort Intrusion Detection. What is Snort Packet Analysis Tool Most widely deployed NIDS Initial release by Marty Roesch in 1998 Current version
Network Security: Lab#5 Port Scanners and Intrusion Detection System
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
Network Security Part III: Security Appliances Firewalls.
Sniffer, tcpdump, Ethereal, ntop
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
SNORT! Among other things. Description Open source ids/ips Real-time analysis: alerting, blocking, logging Real-time response: alerting, session sniping,
Maintaining and Updating Windows Server 2008 Lesson 8.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
Network Analyzer :- Introduction to Ethereal Computer Networking (Graduate Class)
Snort – IDS / IPS.
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Traffic Analysis with Ethereal
SNORT.
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Intrusion Detection Systems (IDS)
Network Analyzer :- Introduction to Wireshark
Presentation transcript:

Snort & ACID

UTSA IS 6973 Computer Forensics SNORT

UTSA IS 6973 Computer Forensics Overview Tool Description Where You Can Find it Applicability to Forensics Tool Use/Screen Views Observations Lessons Learned

UTSA IS 6973 Computer Forensics Technical Description What is Snort? –“Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.” –Performs protocol analysis, content searching/matching –Can detect all sorts of probes and attacks

UTSA IS 6973 Computer Forensics Where to Find the Tool Snort –

UTSA IS 6973 Computer Forensics How Snort Supports Forensics Snort is a packet sniffer on steroids. Can be placed at different points in a network to provide real time information. By logging alerts and rule violations, a systems administrator can be mindful of attacks in progress or research past incidents.

UTSA IS 6973 Computer Forensics Snort Usage Run from the command line or as a Windows Service. Lots of options

UTSA IS 6973 Computer Forensics Snort Options USAGE: snort [-options] snort /SERVICE /INSTALL [-options] snort /SERVICE /UNINSTALL snort /SERVICE /SHOW Options: -A Set alert mode: fast, full, console, or none (alert file ale rts only) -b Log packets in tcpdump format (much faster!) -c Use Rules File -C Print out payloads with character data only (no hex) -d Dump the Application Layer -e Display the second layer header info -E Log alert messages to NT Eventlog. (Win32 only) -f Turn off fflush() calls after binary log writes -F Read BPF filters from file -h Home network = -i Listen on interface -I Add Interface name to alert output -k Checksum mode (all,noip,notcp,noudp,noicmp,none) -l Log to directory

UTSA IS 6973 Computer Forensics More Snort Options -L Log to this tcpdump file -n Exit after receiving packets -N Turn off logging (alerts still work) -o Change the rule testing order to Pass|Alert|Log -O Obfuscate the logged IP addresses -p Disable promiscuous mode sniffing -P Set explicit snaplen of packet (default: 1514) -q Quiet. Don't show banner and status report -r Read and process tcpdump file -R Include 'id' in snort_intf.pid file name -s Log alert messages to syslog -S Set rules file variable n equal to value v -T Test and report on the current Snort configuration -U Use UTC for timestamps -v Be verbose -V Show version number -W Lists available interfaces. (Win32 only) -w Dump management and control frames -X Dump the raw packet data starting at the link layer -y Include year in timestamp in the alert and log files -z Set assurance mode, match on established sesions (for TCP) -? Show this information are standard BPF options, as seen in TCPDump

UTSA IS 6973 Computer Forensics Snort in Action

UTSA IS 6973 Computer Forensics Snort Raw Output

UTSA IS 6973 Computer Forensics Snort Logs – Better Information

UTSA IS 6973 Computer Forensics Observations of Snort - Good FREE! Large user base Community provides constant rule updates Free tools to provide log analysis and /pager alerts

UTSA IS 6973 Computer Forensics Observations of Snort - Bad UNIX tool ported to Windows; behaves like a UNIX tool –Difficult to configure Cryptic command line driven interface All configuration is driven by files Lacks standardized support

UTSA IS 6973 Computer Forensics Lessons Learned - Snort You get what you pay for! Documentation for running Snort on XP is inconsistent and out of date. Since the solution comprises several free tools, each tool has separate issues with XP.

UTSA IS 6973 Computer Forensics ACID

UTSA IS 6973 Computer Forensics Overview Tool Description Where You Can Find it Applicability to Forensics Tool Use/Screen Views Observations Lessons Learned

UTSA IS 6973 Computer Forensics Technical Description What is ACID? –The Analysis Console for Intrusion Databases (ACID) –PHP-based analysis engine to search and process a database of security events generated by various IDSes, firewalls, and network monitoring tools.

UTSA IS 6973 Computer Forensics Where to Find the Tool ACID –

UTSA IS 6973 Computer Forensics How ACID Supports Forensics ACID helps to make sense of Snort data in a visual manner. Can help analyze trends and help filter out the noise by categorizing attacks and IP addresses. Query-builder and search interface. Can provide alerts when events occur.

UTSA IS 6973 Computer Forensics ACID Usage Acid runs as a set of PHP web pages under IIS or Apache. Reports, alerts, and information is accessed through the web interface

UTSA IS 6973 Computer Forensics ACID at Work

UTSA IS 6973 Computer Forensics Alert Screen

UTSA IS 6973 Computer Forensics Alert Screen - Detail

UTSA IS 6973 Computer Forensics Alert Screen – Graph

UTSA IS 6973 Computer Forensics Observations of ACID - Good FREE! Nice graphical interface written in PHP, therefore user community to rely on. Free tools to provide log analysis and /pager alerts. Helps sort through all the info from Snort.

UTSA IS 6973 Computer Forensics Observations of ACID - ACID Lacks standardized support Lots of options to become familiar with

UTSA IS 6973 Computer Forensics Lessons Learned – ACID You get what you pay for! Configuration is file driven, no GUI. Most documentation for running ACID pertains to Apache servers and took some searching to run on IIS. Reliance on PHP means that any interesting aspects on running PHP on Windows had to be sorted through.

UTSA IS 6973 Computer Forensics Summary Both Snort and ACID are excellent tools for Intrusion Detection. Open Source means (hopefully) constant improvements Free tools for companies that cannot afford tools or services provided by other companies. Can be time frustrating to deal with and requires an administrator with the time and expertise to master all the options and create a working system.