Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

APNOMS 2003 Security Gateway System Team Design and Implementation of Security Gateway System for Intrusion Detection on High-speed Links Byoung-Koo Kim,
Snort: Overview Chris Copeland What is an Intrusion Detection System (IDS)? An intrusion detection system is any system which can identify a network.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
IDS In Depth Search: Ideas, Descriptions, and Solutions Presentation by Marshall Washburn November 30 th, 2010 CPSC 420/620 w/ Dr. Grossman.
Distributed Intrusion Detection Mamata Desai ( ) M.Tech.,CSE dept, IIT Bombay.
Table of Contents 3 - IDS types 8 - Ethernet Frame 9 - IP frame 10 - TCP frame 11 - UDP frame 12 - ICMP Frame way handshake 15 - TCP flags 16 -
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Snort - Open Source Network Intrusion Detection System Survey.
Snort Roy INSA Lab.. Outline What is “ Snort ” ? Working modes How to write snort rules ? Snort plug-ins It ’ s show time.
Intrusion Detection Systems and Practices
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Martin Roesch Sourcefire Inc.
Modified slides from Martin Roesch Sourcefire Inc.
Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate.
Modified slides from Martin Roesch Sourcefire Inc.
Modified slides from Martin Roesch Sourcefire Inc.
Honey Inspector Mike Clark Honeynet Project. Honeynet Inspector  Background.
Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.
Report on statistical Intrusion Detection systems By Ganesh Godavari.
Information Networking Security and Assurance Lab National Chung Cheng University Snort.
Martin Roesch Sourcefire Inc.. Topics Background –What is Snort? Using Snort Snort Architecture The Future of Snort and Snort 2.0.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Lecture 11 Intrusion Detection (cont)
CIS 193A – Lesson12 Monitoring Tools. CIS 193A – Lesson12 Focus Question What are the common ways of specifying network packets used in tcpdump, wireshark,
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Intrusion Detection System [Snort]
The open source network intrusion detection system. Secure System Administration & Certification Ravindra Pendyala.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Penetration Testing Security Analysis and Advanced Tools: Snort.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Intrusion Detection Presentation : 2 OF n by Manish Mehta 02/07/03.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
What is a “Network Intrusion Detection System (NIDS)"?
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
Cs490ns - cotter1 Snort Intrusion Detection System
Copyright 2001 Martin Roesch, All Rights Reserved Martin Roesch Sourcefire Inc.
Linux Networking and Security
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Para-Snort : A Multi-thread Snort on Multi-Core IA Platform Tsinghua University PDCS 2009 November 3, 2009 Xinming Chen, Yiyao Wu, Lianghong Xu, Yibo Xue.
An Intrusion Detection System to Monitor Traffic Through the CS Department Christy Jackson, Rick Rossano, & Meredith Whibley April 24, 2000.
Snort Intrusion Detection. What is Snort Packet Analysis Tool Most widely deployed NIDS Initial release by Marty Roesch in 1998 Current version
Network Security: Lab#5 Port Scanners and Intrusion Detection System
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
An overview.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Network Intrusion Detection System (NIDS)
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
IDS Intrusion Detection Systems
Snort – IDS / IPS.
SNORT.
Martin Roesch Sourcefire Inc.
Intrusion Detection Systems (IDS)
Modified slides from Martin Roesch Sourcefire Inc.
Presentation transcript:

Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA

Introducing Snort Snort is: –Small (~1.2M source distribution) –Portable (Linux, Solaris, *BSD, IRIX, HP-UX, WIN32) –Fast (High probability of detection for a given attack on “ average ” networks) –Configurable (Easy rules language, many reporting/logging options) –Free (GPL/Open Source Software) –Current version as of Aug 2001

Snort Design Packet sniffing network intrusion detection system Libpcap-based sniffing interface Rules-based detection engine Multiple output options –decoded logs, tcpdump formatted logs –real-time alerting to syslog, file, database, xml

Detection Engine Rules form “ signatures ” Modular detection elements are combined to form these signatures Anomalous activity detection is possible –stealth scans, OS fingerprinting, invalid ICMP codes, etc Rules system is very flexible, and creation of new rules is relatively simple

Rules Format alert tcp ! /24 any -> /24 any (flags: SF; msg: “SYN-FIN Scan”;) Two sections to a rule rule header: alert tcp ! /24 any -> /24 any rule options: (flags: SF; msg: “SYN-FIN Scan”;) Rule headers and options can be strung together in any combination

Rule Header Features IP addresses –negation, CIDR blocks TCP/UDP ports –negation, ranges, greater than/less than uni/bi-directional port/address consideration

Rule Option Features IP TTL IP ID Fragment size TCP Flags TCP Ack number TCP Seq number Payload size Content Content offset Content depth Session recording ICMP type ICMP code Alternate log files

Uses for Snort Packet Sniffing NIDS Honeypot Monitor Scan Detection/Traps Other Fun Stuff

Packet Sniffing NIDS Load up a good rules set and let it run! – Automatically generates alerts and logs full packet data Alternative alerting/actions can be handled by something like Swatch – alerts, active response, etc

Honeypot Monitor Honeypots are “ deception systems ” that perform intrusion detection by inclusion –Gets rid of all the false alarms! Use Snort ’ s filtering capability to log all the traffic going to the honeypot Post process the data with a good ruleset

Scan Detection/Traps Snort has no formal port scan detection mechanism Setup rules to log traffic to known closed ports & unused addresses Poor man ’ s honeypot/port scan detector Alert tcp any any -> /24 100:600 (flags: S; msg: “TRAP!”;)

Other Fun Stuff Snort is a packet sniffer, can be used to analyze traffic in real-time Motivated people can write rules to pick up all sorts of naughty things –SQL/ODBC, ActiveX, Java/JavaScript, Macro Viruses

Other Fun Stuff (Cont.) SHADOW sensor replacement SHADOW is a free NIDS based on tcpdump Snort can use the SHADOW BPF rule set, plus it ’ s own! Gains: –real-time alerting, payload analysis, rules simplicity, post-processing, etc.

Snort Internal Plugin architecture –stream4 : detect stealth portscans Write detection modules and add them to rule set Hooks for preprocessors –IP defrag, TCP stream reassembly, statistics, etc Hooks for backend/output –database, SNMP, tunnels, etc.

Snort Addon Guardian 1.2.0, by Anthony Stevens and Ernie Lim Guardian is a stand-alone Perl script which watches the output of snort, and will add rules to IPChains on the fly as snort detects and reports an attack. snort-panel, by Xato A very useful windows-based utility for managing, controlling, and monitoring the win32 port of Snort. snortnet, by Fyodor This code is an output plugin that allows you to log Snort alerts to a remote machine. Requires libiap-0.1.tar.gzlibiap-0.1.tar.gz Spade , by Silicon Defense SPADE stands for the Statistical Packet Anomaly Detection Engine. It is a Snort preprocessor plugin which sends alerts of anomalous packet through standard Snort reporting mechanisms. Please consider this to be experimental, though it has worked well for us. ACID 0.9.6b9, by CERT ACID is a PHP-based analysis engine to search and process a database of security incidents generated by Snort. Requires PHP and MySQL. … more

FIN Get Snort from: Writing Snort rules: