Transcript SNORT

SNORT
Presented by Xinchi He
April 10, 2014
WHAT IS SNORT?
 Open source network intrusion prevention and detection system
 Mostly widely deployed IDS/IPS technology worldwide
 Millions of downloads
 400,000 registered users
 De facto standard for IPS
WHAT IS IDS?
 Intrusion detection system
 Device or software application that monitors network or system
activities for malicious activities or policy violations and produces
reports to a management station.
 Network based IDS (NIDS)
 Host based IDS (HIDS)
HOW DOES IDS WORK?
 Signature-based IDS
 Compare against a database of signatures (known malicious threats)
 Similar to most antivirus software detect malware
 Check and update signatures in a period of time.
 Statistical anomaly-based IDS
 Compare against an established baseline
 Bandwidth generally used
 Protocols generally used
 Ports and devices generally connected to
SOME COMMON ATTACKS
 Nuke
 Invalid ICMP packets send to the target
 Use modified ping utility to repeatedly send corrupt data
 Slow down the machine until it stops
 WinNuke (WIn95 NetBIOS)
 Teardrop
 Send IP fragments with overlapping, over-sized payloads to target machine
 TCP/IP fragmentation re-assembly bug
 Linux favors new data
 Windows favors old data
WHY SNORT?
 Open source
 Light weighted
 Flexible
SNORT RULE BASICS
<Rule Acrions> <Protocols> <SRC IP> <SRC Port> <Direction Operator> <DST IP>
<DST Port> (rule options)
Stucture
Example
Rule Actions
alert
Protocols
icmp/tcp/udp
Source IP Address
any/129.244.55.11
Source Port
any/80/21/3389
Direction Operator
->/<>
Destination IP Address
any/129.244.254.100
Destination Port
any/80/8080
(rule options)
(msg:”demo”,sid:447;rev:3)
REFERENCE
 http://en.wikipedia.org/wiki/Denial-of-service_attack
 http://en.wikipedia.org/wiki/Intrusion_detection_system
 http://www.snort.org
 http://www.thegeekstuff.com/2010/08/snort-tutorial/
QUESTIONS?