implementing snort into surfids
play

Implementing Snort into SURFids Sander Keemink and Michael van Kleij - PowerPoint PPT Presentation

Implementing Snort into SURFids Implementing Snort into SURFids Sander Keemink and Michael van Kleij February 6, 2008 1 / 21 Implementing Snort into SURFids 1 SURFids 2 Snort 3 Assignment 4 Experiments and results 5 Integrating Snort 6


  1. Implementing Snort into SURFids Implementing Snort into SURFids Sander Keemink and Michael van Kleij February 6, 2008 1 / 21

  2. Implementing Snort into SURFids 1 SURFids 2 Snort 3 Assignment 4 Experiments and results 5 Integrating Snort 6 Conclusion 7 Future work 2 / 21

  3. Implementing Snort into SURFids SURFids IDS Intrusion Detection System Detects unwanted activity Host based or Network based 3 / 21

  4. Implementing Snort into SURFids SURFids SURFids 4 / 21

  5. Implementing Snort into SURFids SURFids Honeypots Nepenthes Low interaction honeypot Simulates known vulnerabilities Argos High interaction honeypot Analyses the operating system 5 / 21

  6. Implementing Snort into SURFids SURFids Nepenthes information 6 / 21

  7. Implementing Snort into SURFids SURFids Argos information 7 / 21

  8. Implementing Snort into SURFids Snort Snort Network Intrusion Detection System Rule and anomaly based 8 / 21

  9. Implementing Snort into SURFids Assignment Assignment Definition ”Which implementation of Snort into SURFids gives the most added value to the customer while not degrading performance in a noticable way.“ Research questions Added value of Snort? Where to place Snort? How can Snort output be integrated? 9 / 21

  10. Implementing Snort into SURFids Assignment Performance SURFids 3 Mbits constant 30 Mbits max peaks Snort 125 Mbits without packet loss 10 / 21

  11. Implementing Snort into SURFids Experiments and results Experiments Experiments 1 Snort before Argos 2 Snort besides Argos and Nepenthes 3 Snort on the tunnel server 11 / 21

  12. Implementing Snort into SURFids Experiments and results Experiment 1 12 / 21

  13. Implementing Snort into SURFids Experiments and results Results experiment 1 Results Over 90% of the attacks registered by Argos were detected by Snort Other attacks also recognized Timeskew, Multiple entries per attack 13 / 21

  14. Implementing Snort into SURFids Experiments and results Experiment 2 14 / 21

  15. Implementing Snort into SURFids Experiments and results Results experiment 2 Not conducted due to time and hardware limitations 15 / 21

  16. Implementing Snort into SURFids Experiments and results Experiment 3 16 / 21

  17. Implementing Snort into SURFids Experiments and results Results experiment 3 Over 90% of the attacks registered by Nepenthes were detected by Snort Identification of 10% of the possible malicious attacks 17 / 21

  18. Implementing Snort into SURFids Integrating Snort Integrating Snort Barnyard, a Snort output processor Offloads Snort Supports multiple output formats Database aware 18 / 21

  19. Implementing Snort into SURFids Integrating Snort Integrating Snort Develop a database output Parse Comma Seperated Value plugin output Shortest path Relative easy to develop IP packet payload No IP packet payload information informatioin 19 / 21

  20. Implementing Snort into SURFids Conclusion Conclusion Snort provides added value to SURFids Nepenthes possible malicious attacks can be discarded 20 / 21

  21. Implementing Snort into SURFids Future work Future work Develop a program that deals with Snort output 21 / 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend