400 likes | 922 Views
SNORT. Presented by Xinchi He April 10, 2014. What is snort?. Open source network intrusion prevention and detection system Mostly widely deployed IDS/IPS technology worldwide Millions of downloads 400,000 registered users De facto standard for IPS. What is ids?.
E N D
SNORT Presented by Xinchi He April 10, 2014
What is snort? • Open source network intrusion prevention and detection system • Mostly widely deployed IDS/IPS technology worldwide • Millions of downloads • 400,000 registered users • De facto standard for IPS
What is ids? • Intrusion detection system • Device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. • Network based IDS (NIDS) • Host based IDS (HIDS)
How does ids work? • Signature-based IDS • Compare against a database of signatures (known malicious threats) • Similar to most antivirus software detect malware • Check and update signatures in a period of time. • Statistical anomaly-based IDS • Compare against an established baseline • Bandwidth generally used • Protocols generally used • Ports and devices generally connected to
Some common attacks • Nuke • Invalid ICMP packets send to the target • Use modified ping utility to repeatedly send corrupt data • Slow down the machine until it stops • WinNuke (WIn95 NetBIOS) • Teardrop • Send IP fragments with overlapping, over-sized payloads to target machine • TCP/IP fragmentation re-assembly bug • Linux favors new data • Windows favors old data
Why snort? • Open source • Light weighted • Flexible
Snort rule basics <Rule Acrions> <Protocols> <SRC IP> <SRC Port> <Direction Operator> <DST IP> <DST Port> (rule options)
Reference • http://en.wikipedia.org/wiki/Denial-of-service_attack • http://en.wikipedia.org/wiki/Intrusion_detection_system • http://www.snort.org • http://www.thegeekstuff.com/2010/08/snort-tutorial/