Modified slides from Martin Roesch Sourcefire Inc.

Slides:



Advertisements
Similar presentations
Snort: Overview Chris Copeland What is an Intrusion Detection System (IDS)? An intrusion detection system is any system which can identify a network.
Advertisements

Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Table of Contents 3 - IDS types 8 - Ethernet Frame 9 - IP frame 10 - TCP frame 11 - UDP frame 12 - ICMP Frame way handshake 15 - TCP flags 16 -
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Snort - Open Source Network Intrusion Detection System Survey.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Snort Roy INSA Lab.. Outline What is “ Snort ” ? Working modes How to write snort rules ? Snort plug-ins It ’ s show time.
Intrusion Detection Systems and Practices
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Martin Roesch Sourcefire Inc.
Modified slides from Martin Roesch Sourcefire Inc.
Introduction to Snort’s Working and configuration file
Modified slides from Martin Roesch Sourcefire Inc.
Intrusion Detection Systems Sai Nandoor Priya Selvam Balaji Badam.
Report on statistical Intrusion Detection systems By Ganesh Godavari.
Intrusion Detection MIS ALTER 0A234 Lecture 4.
Information Networking Security and Assurance Lab National Chung Cheng University Snort.
Martin Roesch Sourcefire Inc.. Topics Background –What is Snort? Using Snort Snort Architecture The Future of Snort and Snort 2.0.
Log Analysis and Intrusion Detection By Srikrishna Gudavalli Venkata Naga Vamsi Krishna Ravi Kiran Yellepeddy.
Lecture 11 Intrusion Detection (cont)
CIS 193A – Lesson12 Monitoring Tools. CIS 193A – Lesson12 Focus Question What are the common ways of specifying network packets used in tcpdump, wireshark,
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Network Forensics Networking Basics Collecting Network-Based Evidence (NBE) Collection of Packets using Tools Windows Intrusion UNIX Intrusion.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Intrusion Detection System [Snort]
The open source network intrusion detection system. Secure System Administration & Certification Ravindra Pendyala.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Polytechnic University Introduction 1 Intrusion Detection Systems Examples of IDSs in real life r Car alarms r Fire detectors r House alarms r Surveillance.
Penetration Testing Security Analysis and Advanced Tools: Snort.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
SNORT An Open Source Network Intrusion Prevention and Detection System. (NIPS and NIDS)
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
Cs490ns - cotter1 Snort Intrusion Detection System
Intrusion Detection System (Snort & Barnyard) : Security and Privacy on the Internet Instructor: Dr. A. K. Aggarwal Presented By: Vic Ho & Kashif.
An Introduction to Snort Richard Bejtlich TaoSecurity Houston ISSA Meeting 11 Apr 02.
Copyright 2001 Martin Roesch, All Rights Reserved Martin Roesch Sourcefire Inc.
Linux Networking and Security
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
Writing Snort Rules A quick guide Brian Caswell. 2 The life of a packet through Snort’s detection engine.
An Intrusion Detection System to Monitor Traffic Through the CS Department Christy Jackson, Rick Rossano, & Meredith Whibley April 24, 2000.
Snort Intrusion Detection. What is Snort Packet Analysis Tool Most widely deployed NIDS Initial release by Marty Roesch in 1998 Current version
Network Security: Lab#5 Port Scanners and Intrusion Detection System
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
An overview.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Sniffer, tcpdump, Ethereal, ntop
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
Greg Steen.  What is Snort?  Snort purposes  Where can it be used?
Network Intrusion Detection System (NIDS)
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Snort. Overview What ’ s snort? Snort architecture Snort components Detection engine and rules in snort Possible research works in snort.
Snort – network intrusion detection system 2008 Lab seminars June 2, 2008 Laziz Yunusov Advanced Networking Technology Lab. (YU-ANTL) Dept. of Information.
IDS Intrusion Detection Systems
Snort – IDS / IPS.
SNORT.
Martin Roesch Sourcefire Inc.
Intrusion Detection Systems (IDS)
An Introduction to Snort
Modified slides from Martin Roesch Sourcefire Inc.
Snort Based Intrusion Detection System
SNORT RULES.
Presentation transcript:

Modified slides from Martin Roesch Sourcefire Inc.

Topics Intro to Snort Using Snort Snort Architecture Third-Party Enhancements

Background – Policy Successful intrusion detection depends on policy and management as much as technology –Security Policy (defining what is acceptable and what is being defended) is the first step –Notification Who, how fast? –Response Coordination

Intro to Snort What is Snort? –Snort is a multi-mode packet analysis tool Sniffer Packet Logger Forensic Data Analysis tool Network Intrusion Detection System Where did it come from? –Developed out of the evolving need to perform network traffic analysis in both real-time and for forensic post processing

Snort “Metrics” Portable (Linux, Windows, MacOS X, Solaris, BSD, IRIX, Tru64, HP-UX, etc) Fast (High probability of detection for a given attack on 100Mbps networks) Configurable (Easy rules language, many reporting/logging options Free (GPL/Open Source Software)

Snort Design Packet sniffing “lightweight” network intrusion detection system Libpcap-based sniffing interface Rules-based detection engine Plug-in system allows endless flexibility

Detection Engine Rules form “signatures” Modular detection elements are combined to form these signatures Wide range of detection capabilities –Stealth scans, OS fingerprinting, buffer overflows, back doors, CGI exploits, etc. Rules system is very flexible, and creation of new rules is relatively simple

Using Snort Three main operational modes –Sniffer Mode –Packet Logger Mode –NIDS Mode –(Forensic Data Analysis Mode) Operational modes are configured via command line switches –Snort automatically tries to go into NIDS mode if no command line switches are given, looks for snort.conf configuration file in /etc

Using Snort – Sniffer Mode Works much like tcpdump Decodes packets and dumps them to stdout BPF filtering interface available to shape displayed network traffic

Packet Logger Mode Gee, it sure would be nice if I could save those packets to disk… Multi-mode packet logging options available –Flat ASCII, tcpdump, XML, database, etc available Log all data and post-process to look for anomalous activity

NIDS Mode Wide variety of rules available for signature engine (~1300 as of June 2001, grow to ~2900 at May 2005, now over 20,000 rules) Multiple detection modes available via rules and plug-ins –Rules/signature –Statistical anomaly –Protocol verification

Snort Rules

bad-traffic.rulesexploit.rulesscan.rules finger.rulesftp.rulestelnet.rules smtp.rulesrpc.rulesrservices.rules dos.rulesddos.rulesdns.rules tftp.rulesweb-cgi.rulesweb-coldfusion.rules web-frontpage.rulesweb-iis.rulesweb-misc.rules web-attacks.rulessql.rulesx11.rules icmp.rulesnetbios.rulesmisc.rules backdoor.rulesshellcode.rulespolicy.rules porn.rulesinfo.rulesicmp-info.rules virus.ruleslocal.rulesattack-responses.rules

Snort Rules Snort rules are extremely flexible and are easy to modify Sample rule to detect SubSeven trojan: alert tcp $EXTERNAL_NET > $HOME_NET any (msg:"BACKDOOR subseven 22"; flags: A+; content: "|0d0a5b52504c5d d0a|"; reference:arachnids,485; reference:url, sid:103; classtype:misc-activity; rev:4;) Elements before parentheses comprise ‘rule header’ Elements in parentheses are ‘rule options’

Snort Rules alert tcp $EXTERNAL_NET > $HOME_NET any (msg:"BACKDOOR subseven 22"; flags: A+; content: "|0d0a5b52504c5d d0a|"; reference:arachnids,485; reference:url, sid:103; classtype:misc-activity; rev:4;) alert action to take; also log, pass, activate, dynamic tcp protocol; also udp, icmp, ip $EXTERNAL_NET source address; this is a variable – specific IP is ok source port; also any, negation (!21), range (1:1024) -> direction; best not to change this, although <> is allowed $HOME_NET destination address; this is also a variable here any destination port

Snort Rules alert tcp $EXTERNAL_NET > $HOME_NET any (msg:"BACKDOOR subseven 22"; flags: A+; content: "|0d0a5b52504c5d d0a|"; reference:arachnids,485; reference:url, sid:103; classtype:misc-activity; rev:4;) msg:”BACKDOOR subseven 22”; message to appear in logs flags: A+; tcp flags; many options, like SA, SA+, !R content: “|0d0…0a|”; binary data to check in packet; content without | (pipe) characters do simple content matches reference…; where to go to look for background on this rule sid:103; rule identifier classtype: misc-activity; rule type; many others rev:4; rule revision number other rule options possible, like offset, depth, nocase

Snort Rules Rules which actually caught intrusions –alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"MS-SQL xp_cmdshell - program execution"; content: "x|00|p|00|_|00|c|00|m|00|d|00|s|00|h|00|e|00|l|00|l|00| "; nocase; flags:A+; classtype:attempted-user; sid:687; rev:3;) caught compromise of Microsoft SQL Server –alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS 80 (msg:"WEB-IIS cmd.exe access"; flags: A+; content:"cmd.exe"; nocase; classtype:web-application- attack; sid:1002; rev:2;) caught Code Red infection –alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"INFO FTP \"MKD / \" possible warez site"; flags: A+; content:"MKD / "; nocase; depth: 6; classtype:misc- activity; sid:554; rev:3;) caught anonymous ftp server

Conclusion Snort is a powerful tool, but maximizing its usefulness requires a trained operator Becoming proficient with network intrusion detection takes 12 months; “expert” 24-36? Managed network security providers should collect enough information to make decisions without calling clients to ask what happened

Plug-Ins Preprocessor –Packets are examined/manipulated before being handed to the detection engine Detection –Perform single, simple tests on a single aspect/field of the packet Output –Report results from the other plug-ins

Snort Architecture

Data Flow Packet Decoder Preprocessor (Plug-ins) Detection Engine (Plug-ins) Output Stage (Plug-ins) Packet Stream Sniffing Snort Data Flow Alerts/Logs

Rule Header Alert tcp any -> any Rule Options (flags: SF; msg: “SYN-FIN Scan”;) Alert tcp any -> any (flags: S12; msg: “Queso Scan”;) (flags: F; msg: “FIN Scan”;) Detection Engine: Rules

Alert tcp any -> any Rule Node (flags: SF; msg: “SYN-FIN Scan”;) (flags: S12; msg: “Queso Scan”;) (flags: F; msg: “FIN Scan”;) Option Node Detection Engine: Internal Representation

Rule Node Rule Node Rule Node Rule Node Rule Node Option Node Option Node Option Node Option Node Option Node Option Node Option Node Option Node Option Node Option Node Option Node Detection Engine: Fully Populated

Third-Party Enhancements

SnortSnarf snortsnarf/ SnortSnarf is a Perl program to take files of alerts from the Snort to produce HTML reports Output intended for diagnostic inspection Used to have commercial support from SiliconDefense

Demarc NIDS management console, integrating Snort with the convenience and power of a centralized interface for all network sensors Commercialized by Applied Watch for Enterprise Open Source Security Management –Snort® (IDS) –Snort-Inline (IPS) –Labrea Tarpit (Sticky Honeypot) –ClamAV (Antivirus) –Nessus (Vulnerability Management)

What Do The Packet Dumps Look Like? =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 11/09-11:12: :1032 -> :23 TCP TTL:128 TOS:0x0 ID:31237 IpLen:20 DgmLen:59 DF ***AP*** Seq: 0x16B6DA Ack: 0x1AF156C2 Win: 0x2217 TcpLen: 20 FF FC 23 FF FC 27 FF FC 24 FF FA E 53..#..'..$....ANS 49 FF F0 I.. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 11/09-11:12: :23 -> :1032 TCP TTL:255 TOS:0x0 ID:49900 IpLen:20 DgmLen:61 DF ***AP*** Seq: 0x1AF156C2 Ack: 0x16B6ED Win: 0x2238 TcpLen: 20 0D 0A 0D 0A E 4F E 37 0D 0A 0D....SunOS D 0A 0D =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+