Intrusion Detection System (Snort & Barnyard) 60-564: Security and Privacy on the Internet Instructor: Dr. A. K. Aggarwal Presented By: Vic Ho & Kashif.

Slides:



Advertisements
Similar presentations
1 Network Intrusion Detection System & Its Analyzer: Snort & ACID : Security and Privacy on the Internet Instructor: Dr. A. K. Aggarwal Presented.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
MONITORING TOOLS Open Source Security Tools to monitor your network.
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Snort Roy INSA Lab.. Outline What is “ Snort ” ? Working modes How to write snort rules ? Snort plug-ins It ’ s show time.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Martin Roesch Sourcefire Inc.
Modified slides from Martin Roesch Sourcefire Inc.
Introduction to Snort’s Working and configuration file
Modified slides from Martin Roesch Sourcefire Inc.
Modified slides from Martin Roesch Sourcefire Inc.
Information Networking Security and Assurance Lab National Chung Cheng University Analysis Console for Intrusion Databases.
Information Networking Security and Assurance Lab National Chung Cheng University Snort.
Lecture 11 Intrusion Detection (cont)
CIS 193A – Lesson12 Monitoring Tools. CIS 193A – Lesson12 Focus Question What are the common ways of specifying network packets used in tcpdump, wireshark,
Using Argus Audit Trails to Enhance IDS Analysis Jed Haile Nitro Data Systems
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Simulation of IDS by using Activeworx Security Center (ASC) and Snort, MySQL, CommView Presented by Shamsul Wazed & Quazi Rahman School of Computer Science.
The open source network intrusion detection system. Secure System Administration & Certification Ravindra Pendyala.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Snort & IDScenter : Security and Privacy on the Internet Instructor: Dr. A. K. Aggarwal Presented By: Tarik El Amsy, Lihua Duan Date: March 29, 2006.
Hands-On Microsoft Windows Server 2008
Penetration Testing Security Analysis and Advanced Tools: Snort.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
SNORT Tutorial Sreekanth Malladi (modifying original by N. Youngworth)
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
What is a “Network Intrusion Detection System (NIDS)"?
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
Cs490ns - cotter1 Snort Intrusion Detection System
Copyright 2001 Martin Roesch, All Rights Reserved Martin Roesch Sourcefire Inc.
Adaptive Data Visualization Packet Information Collection and Transformation for Network Intrusion Detection and Prevention Richard A. Aló,
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Snort Intrusion Detection. What is Snort Packet Analysis Tool Most widely deployed NIDS Initial release by Marty Roesch in 1998 Current version
Network Security: Lab#5 Port Scanners and Intrusion Detection System
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Presentation By Muhammad Hasan 1 NIDS with Snort and SnortSnarf By Muhammad Hasan Course : Instructor: Dr. A. K. Aggarwal Winter, 2006.
Greg Steen.  What is Snort?  Snort purposes  Where can it be used?
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Snort. Overview What ’ s snort? Snort architecture Snort components Detection engine and rules in snort Possible research works in snort.
Some Great Open Source Intrusion Detection Systems (IDSs)
Snort – IDS / IPS.
SNORT.
Intrusion Detection Systems (IDS)
Chapter 8: Monitoring the Network
Plugins, Preprocessors, Output Modules And Third Party Enhancement
Presentation transcript:

Intrusion Detection System (Snort & Barnyard) : Security and Privacy on the Internet Instructor: Dr. A. K. Aggarwal Presented By: Vic Ho & Kashif Saeed Date: March 20, 2006

Table of Contents 1. Introduction 2. System Architecture & Data Flow 3. Software Component 3.1. Packet Excalibur 3.2. Snort 3.3. Barnyard 3.4. MySQL Server 4. Acknowledgement 5. Reference

1. Introduction Intrusion: a series of unauthorized actions that attempt to compromise the confidentiality, integrity or availability of the resources [1]. Intrusion Detection System: is used to detect this kind of actions in order to warn the administrator so that further prevention can be done.

2. System Architecture & Data Flow

3. Software Component 3.1. Packet Excalibur 3.2. Snort 3.3. Barnyard 3.4. MySQL Server

3.1. Packet Excalibur A multi-platform graphical and scriptable network packet engine which has extensible text based protocol descriptions [2]. Used to built and customize packets in order to match the signatures.

3.1. Packet Excalibur Packet Generation: 1. Configure Data Link Type 2. Configure Ethernet Layer 3. Configure IP Layer 4. Configure TCP Layer 5. Configure Data

3.1. Packet Excalibur 1.Configure Data Link Type Select 1: ethernet [iso]

3.1. Packet Excalibur 2.Configure Ethernet Layer Set the value of Src vender Set the value of Src Address Set the value of Protocol type

3.1. Packet Excalibur 3.Configure IP Layer Set the value of Protocol Set the value of Source IP Set the value of Dest. IP

3.1. Packet Excalibur 4.Configure TCP Layer Set the value of Dst Port Set the value of Sequence nbr Set the value of Acknwldg nbr

3.1. Packet Excalibur 5.Configure Data Set the number of bytes to add Input the data according to the contents of the snort rules

3.2. SNORT Snort is Open Source, covered under the GPL Developed by Martin Roesch Rules-based detection engine Plug-in system allows endless flexibility Rules are readily editable and freely available Performs Real-time traffic analysis, logging, and alerting Sourcefire offers commercial version of Snort (Sourcefire Intrusion Sensor)

Snort – Basic Configuration Modes Snort can be run in one of several configuration modes Sniffer Mode – Snort reads packets off of the network and displays them on console Packet Logger Mode – simply logs packets to disk Network Intrusion Detection System (NIDS) mode – Snort grabs traffic from the network using Winpcap, analyzes for matches to a defined rule set and generates alerts (as appropriate)

Snort Data Flow

Packet Decoder Libpcap,External Packet Capture Library (UNIX, Windows ports (winpcap)) Captures raw packets (required for Snort processing) Series of Packet Decoders decode specific protocol elements of each packet As packets are decoded, decoded packet data is stored in a Snort data structure for analysis

Plug-Ins Preprocessor Packets are examined/manipulated before being handed to the detection engine Detection Perform single, simple tests on a single aspect/field of the packet Output Report results from the other plug-ins

Preprocessors Examine suspicious packets Manipulate packets to prepare for detection engine Packets are passed through every Preprocessor for thorough packet inspection process

Detection Engine Performs several functions Rule Parsing – rules are loaded into internal data structures, and guide packet inspection Signature Detection – attack signatures are constructed by parsing Snort rules Other possibilities Snort + Netfilter (or Divert Sockets) = Gateway IDS (or “packet scrubber”) Snort + NMAP = Target-based IDS

Output plug-in Database (MySQL, PostgreSQL, Oracle, unixODBC, etc) XML Unified (Snort specific) format ASCII, syslog, WinPopup (SMB) Etc

Running Snort To run snort go to your snort bin directory. In our case it was C:\Snort\bin. Once there you can run snort by combining appropriate options with snort USAGE: snort [-options] e.g. Running in SNIFFER MODE Snort – v -i or Snort – vd Running in PACKET LOGGER MODE Snort – dev – l C:\snort\log -i (C:\snort\log is the log directory location in our experiment)

Running in NETWORK INTRUSTION DETECTION MODE Snort – dev – l C:\snort\log – c C:\snort\etc\snort.conf -i (C:\snort\etc\snort.conf is the location for snort.conf file in our experiment) COMMAND we used for running snort in our project was Snort – dev – l C:\snort\log – c C:\snort\etc\snort.conf -i Running Snort

3.3. Barnyard An add-on tool for Snort Barnyard allows logging/alerting operations to be offloaded from Snort Uses data generated by the Snort Unified output plug-in (Barnyard is a Unified Log Reader)

Barnyard Barnyard allows logging/alerting operations to be offloaded from Snort Improves the performance of Snort Unified output logging is comparatively fast Offloads performance-intensive logging operations from Snort (e.g. database logging) This frees Snort to focus on packet inspection Critical for large volume, high bandwidth environments (e.g. 1000Mbps)

Snort Configuration Unified: Snort unified binary format alerting and logging The unified output plug-in provides new format for logging and generating alerts from Snort, the "unified" format Reduces the overhead for logging and alerting to slow storage mechanisms. E.g Databases.

Unified OUTPUT PLUG-IN output alert_unified: snort.alert, limit 128 output log_unified: snort.log, limit 128 Limit: Maximum size of spool file in MB (default: 128) Snort.alert and snort.log are base filenames to write to, they are appended with current time. E.g snort-unified.alert snort-unified.log Snort Configuration

Barnyard Configuration Modify barnyard.conf to turn on/off data processors and output plugins Where to find the config file ? $Barnyard_HOME\etc Data processors (dp’s) Two types of data processors Alert Log

Data processor for ALERTs dp_alert The dp_alert data processor is capable of reading the alert (event) format generated by Snort's spo_unified plug-in. Used with output plug-ins that support the "alert" input type. This plug-in takes no arguments. processor dp_alert Barnyard Configuration

Data processor for LOGs dp_log Capable of reading the log format generated by Snort's spo_unified plug-in. Used with output plug-ins that support the "log" input type This plug-in takes no arguments processor dp_log Barnyard Configuration

Output Plugin alert_fast Converts data from the dp_alert plugin into an approximation of Snort's "fast alert" mode. “output alert_fast” log_dump Converts data from the dp_log plugin into an approximation of Snort's "ASCII packet dump" mode “output log_dump” alert_html Creates a series of html pages about recent alerts “output alert_html” Barnyard Configuration

alert_csv Creates a CSV output file of alerts “output alert_csv: csv.out” Fields available to this plugin are Timestamp Msg Srcip Sport Dstip Etc, all fields are comma separated with no space in between Barnyard Configuration

acid_db ( Used in the project ) Available as both a log and alert output plug-in. Used to output data into the db schema output alert_acid_db: mysql, sensor_id 1, database snort, server localhost, user snortusr output log_acid_db: mysql, sensor_id 1, database snort, server localhost, user snortusr Barnyard Configuration

Running Barnyard Three modes of operations One-Shot Barnyard will process the specified file and exits Continual Barnyard will start with the specified file and continue to process new data (and new spool files) as it appears Continual w/ checkpoint Uses a checkpoint file to track where it is.

Command to run > barnyard –c $Barnyard_HOME\etc\barnyard.conf –d $SNORT_HOME\log snort-unified.alert -cSpecifies where the barnyard configuration file is -dSpecifies where the Spool file directory is -fSets the base spool file name Running Barnyard

3.4. MySQL Database Project uses MySQL database for logging and alerting Database schema is provided by the snort installation documentation. Schema scripts located in $SNORT_HOME\schemas Snapshot

Database Configuration A root user is created with standard mysql database installation. Login with root and run the script to create snort schema Mysql > SOURCE $SNORT_HOME\Schemas\create_mysql Next create a user for barnyard to access this database mysql >Create user snortusr; Grant access and modification rights to this user. mysql > grant INSERT,SELECT on snort.* to mysql > grant INSERT,SELECT,UPDATE on snort.sensor to

4. Acknowledgement We would like to thank group 3 (Tarik El Amsy & Lihua Duan) who helped in better understanding of snort rules in respect to packet generation.

5. Reference [1]“Intrusion Detection.” Wikipedia, the free encyclopedia. 7 Mar [2]“Packet Excalibur.” Security Bugware. 7 Mar [3]“WinIDS Installation Guide.” WinSnort.com. 7 Mar [4]“WinPcap: The Windows Packet Capture Library.” Winpcap.org.. [5]MySQL.. [6] Snort.org..