150 likes | 304 Views
FORE SEC Academy Security Essentials (III). Network-Based Intrusion Detection. Need for Network-based Intrusion Detection. Most attacks come from the Internet Detecting these attacks allows a site to tune defenses If we correlate data from a large number of sources we increase our
E N D
FORESEC AcademySecurity Essentials (III) Network-Based IntrusionDetection
Need for Network-basedIntrusion Detection • Most attacks come from the Internet • Detecting these attacks allows a site to tune defenses • If we correlate data from a large number of sources we increase our capability The statistic that 90% of all attacks are perpetrated by insiders is dead wrong.
Inside a Network Attack WinNuke, (also called OOBNuke), uses TCP 139and OOB Data, even if NetBIOS is not enabled. It results in the “Blue Screen of Death”. Patches/service packs are available OOB stands for Out Of Band and is actually misnamed; it should say .Urgent mode., which is Urgent bit set in the TCP header flags and the urgent pointer.
Snort Design Goals • Low cost, lightweight • Suitable for monitoring multiple sites/sensors • Low false alarm rate • Efficient detect system • Low effort for reporting
Writing Snort Rules • Can create custom rules to filter on specific content. • Pre-loaded with hundreds of rules (but you may need to create one or more custom rules) • Simple to write yet powerful enough to capture most types of traffic • Options - Basic (Pass, Log, Alert) - Advanced (Activate, Dynamic)