Top Banner
Snort Intrusion Snort Intrusion detection system detection system Charles Beckmann Anthony Magee Vijay Iyer
15

Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

Dec 14, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

Snort Intrusion Snort Intrusion detection systemdetection system

Charles BeckmannAnthony Magee

Vijay Iyer

Page 2: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

2

TopicsTopics

Software Setup Motivations Rules Performance Collected Data References

Page 3: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

3

SoftwareSoftware

Debian 5.0 - Robust and stable platform with large community support

IPtables - Popular and preferred on Debian Snort - Open source, mature, rule driven

IDS Guardian Active Response - Active firewall

modification scripts for several firewall programs (not to be confused with DansGuardian)

Page 4: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

SnortSnort

Network intrusion detection and prevention system (IDS)

Analyzes incoming traffic for signs of attack Protocol analysis Heuristic content matching Rule based

Report generation

Page 5: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

5

Guardian Active ResponseGuardian Active Response

Designed for Snort Whitelist for preventing unwanted

blocking Written is Perl Supports watching multiple IPs

Page 6: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

6

IPtablesIPtables

Default firewall controller for Debian Simple to use Provides fine grained control when

needed Example rule to drop all MySQL traffic to a

specific machine iptables -A FORWARD -p tcp -m tcp -s 0.0.0.0/0 -d

<some IP> --dport 3306 -m state --state NEW -j DROP

Page 7: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

Motivations:Motivations:Why do we need Snort?Why do we need Snort?

Many forms of attack can go completely undetected by casual observation

Many modern attacks, such as DDOS, are impossible to prevent or contain using static firewall rules

We need a cheap and automated solution

Page 8: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

Motivations:Motivations:Why use Guardian?Why use Guardian?

Uses snort logs to dynamically block threats

Page 9: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

SNORT Network ConfigurationSNORT Network Configuration

Page 10: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

Setup & IntegrationSetup & Integration

Installed on a dedicated machine: The Acronym Friendly Vast Lab Intrusion Detection and Prevention System (AFVLIDPS)

Passive connection to hub sniffs incoming traffic without incurring additional delay

There is a delay, however, between the start of the attack and the Guardian response

Page 11: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

11

RulesRules

Avoid service interruptions due to false positives

Creating rules requires nontrivial amounts of data and analysis

Quality of Service Restrict to times of day Restrict based on attack frequency Staged restrictions

Page 12: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

PerformancePerformance

Guardian can read the logs quickly MySQL logs are used to view reports and

do not affect speed of system QoS - Quality of Service

Block all potentially harmful traffic? Limit harmful traffic? Leak a little traffic from harmful sources?

Page 13: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

Data / ResultsData / Results

Page 14: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

ReferencesReferences

“Design Of an Autonomous Anti DDos network” by Angel Cearns

http://www.snort.org http://www.iptables.org http://www.chaotic.org/guardian/

14

Page 15: Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.

This is the last slideThis is the last slide

There are no further slides after this slide. No, Really. You may now ask questions They will be answered with questionable

sincerity