COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

COEN 252 Computer Forensics Using TCPDump / Windump for package analysis.
Snort: Overview Chris Copeland What is an Intrusion Detection System (IDS)? An intrusion detection system is any system which can identify a network.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Snort - Open Source Network Intrusion Detection System Survey.
Snort Roy INSA Lab.. Outline What is “ Snort ” ? Working modes How to write snort rules ? Snort plug-ins It ’ s show time.
Intrusion Detection Systems and Practices
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Martin Roesch Sourcefire Inc.
Modified slides from Martin Roesch Sourcefire Inc.
Introduction to Snort’s Working and configuration file
Modified slides from Martin Roesch Sourcefire Inc.
Modified slides from Martin Roesch Sourcefire Inc.
Information Networking Security and Assurance Lab National Chung Cheng University Snort.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
CIS 193A – Lesson12 Monitoring Tools. CIS 193A – Lesson12 Focus Question What are the common ways of specifying network packets used in tcpdump, wireshark,
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Simulation of IDS by using Activeworx Security Center (ASC) and Snort, MySQL, CommView Presented by Shamsul Wazed & Quazi Rahman School of Computer Science.
Module 1: Reviewing the Suite of TCP/IP Protocols.
Intrusion Detection System [Snort]
The open source network intrusion detection system. Secure System Administration & Certification Ravindra Pendyala.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Snort & IDScenter : Security and Privacy on the Internet Instructor: Dr. A. K. Aggarwal Presented By: Tarik El Amsy, Lihua Duan Date: March 29, 2006.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Chabot College ELEC Ports (Layer 4).
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
SNORT Tutorial Sreekanth Malladi (modifying original by N. Youngworth)
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
Cs490ns - cotter1 Snort Intrusion Detection System
Intrusion Detection System (Snort & Barnyard) : Security and Privacy on the Internet Instructor: Dr. A. K. Aggarwal Presented By: Vic Ho & Kashif.
An Introduction to Snort Richard Bejtlich TaoSecurity Houston ISSA Meeting 11 Apr 02.
Linux Networking and Security
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Snort Intrusion Detection. What is Snort Packet Analysis Tool Most widely deployed NIDS Initial release by Marty Roesch in 1998 Current version
Network Security: Lab#5 Port Scanners and Intrusion Detection System
An overview.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Sniffer, tcpdump, Ethereal, ntop
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
Greg Steen.  What is Snort?  Snort purposes  Where can it be used?
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Network Intrusion Detection System (NIDS)
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Snort. Overview What ’ s snort? Snort architecture Snort components Detection engine and rules in snort Possible research works in snort.
Snort – network intrusion detection system 2008 Lab seminars June 2, 2008 Laziz Yunusov Advanced Networking Technology Lab. (YU-ANTL) Dept. of Information.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
Snort – IDS / IPS.
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Learning Snort Rules by Capturing Intrusions In Live Network Traffic
SNORT.
Intrusion Detection Systems (IDS)
LAB 9 – INTRUSION DETECTION AND PREVENTION SYSTEMS
Firewall Installation
Presentation transcript:

COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort

Snort Freeware. Designed as a network sniffer. Useful for traffic analysis. Useful for intrusion detection. Warning: Has become a target of attackers.

Snort Snort is a good sniffer. Snort uses a detection engine, based on rules. Packets that do not match any rule are discarded. Otherwise, they are logged. Rule matching packets can also trigger an alert.

Snort Forensic Use: Filter logs of large size quickly.

Snort: Architecture Packet Decode Engine Uses the libpcap package Packages are decoded for link-level protocols, then for higher protocols. Preprocessor Plug-ins Each preprocessors examines and manipulates packages, e.g. for alerts. Detection Engine Checks packages against the various options in the snort rules files. Detection Plug-Ins Allow additional examinations Output Plug-Ins

Snort: Architecture Package View: NIC in promiscuous mode. Grab packages from the network card. Decode packages Run through various rule sets. Output logs and alerts.

Snort Rules Rule Header alert tcp $External_NET any -> $Home_Net21 Rule Options (msg: “ftp Exploit”; flow_to_server, established; content: “|31c031db 41c9b046 cd80 31c031db|”; reference: bugtraq,1387; classtype:attempted- admin; sid 344; rev4;)

Snort Rules Rule Header Alert / log / pass / dynamic / activate tcp: Protocol being used. UDP / IP / ICMP $External_NET: This is the source IP, default is any. any: This is the source port set to “any” ->: Direction of conversation. $Home_Net: This is a variable that Snort will replace with 21: Port to be monitored. The header concerns all tcp packages coming from any port from the outside to port 21 on the inside.

Snort Rules Rule Options ( ): Rule option is placed in parentheses. msg: “ftp Exploit”; flow_to_server, established; content: “|31c031db 41c9b046 cd80 31c031db|”; Snort will look whether the package contains this string, the dangerous payload. reference: bugtraq,1387; Snorts allow links to third-party warnings. classtype:attempted-admin; Class Types allow users to quickly scan for attack types sid 344; Snort rule unique identifier. Can be checked against rev4; All rules are part of a revision process to limit false positives and detect new attacks.

Snort Rules Activation: Alert and then turn on another dynamic rule. Dynamic: Log the traffic when called by the above activation rule. Pass: Ignore the traffic. Log: Log the traffic, but do not alert.

Snort Rules TCP: TCP protocol, for example SMTP, HTTP, FTP UDP: For example DNS traffic ICMP: For example ping, traceroute. IP: For example IPSec, IGMP

Snort Rules Content: Content checked by the Boyer Moore pattern matching algorithm. Flow: Link to the detection plug-ins.

Using Snort Install with libcap / wincap. Move config / rule files to correct directory and alter them. Use Snort from the commandline. Snort can be used to sniff or to decode.

Using Snort Sniffer Mode Run-time switches: -v verbose -d dump package payloads -x dump entire package in hex -a display arp packages -e display link layer data snort -dvae

Using Snort Packet Logger Mode Tell snort to output packages to a log file. Command line options: -l dump packages into log directory -b log packages in binary (tcpdump) format Example: snort –b –l /temp/snort

Using Snort Binary log files are in tcpdump format Can be read by snort with the –r switch Readback can be used to dump, log, or perform detection

Using Snort Full Text Logging Packets are logged in plain ascii format One file created per protocol port pair A port scan creates too many files.

Using Snort NIDS Mode Load snort with a set of rules, configure packet analysis plug-ins, and let it monitor hostile network activity

Using Snort Use –c switch to specify configuration file. Snort –c snort.conf If no config file is specified, snort looks in the /etc directory.

Using Snort NIDS mode: Specify an alternative logging directory with –l Specify an alternate alert mode -AL fast, full, none, console -M Send SMB (popup) alerts