0% found this document useful (0 votes)
139 views7 pages

Configuring Snort IDS for Cyber Security

The document provides instructions for configuring an intrusion detection system (IDS) called Snort. It begins with an overview of IDS and what it is used for. It then describes different types of IDS, including network IDS, host IDS, protocol-based IDS, and hybrid IDS. It also outlines two main methods for detecting intrusions: signature-based detection and anomaly-based detection. The remainder of the document provides steps for installing Snort using apt-get on Ubuntu, adding rules, and using Snort to detect packets.

Uploaded by

DASHRATH SINGH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
139 views7 pages

Configuring Snort IDS for Cyber Security

The document provides instructions for configuring an intrusion detection system (IDS) called Snort. It begins with an overview of IDS and what it is used for. It then describes different types of IDS, including network IDS, host IDS, protocol-based IDS, and hybrid IDS. It also outlines two main methods for detecting intrusions: signature-based detection and anomaly-based detection. The remainder of the document provides steps for installing Snort using apt-get on Ubuntu, adding rules, and using Snort to detect packets.

Uploaded by

DASHRATH SINGH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Assignment

For the partial fulfilment of


[Link] Cyber Security
(2022-2024)

Submitted to Submitted by
MR. Honey Gocher Dashrath Singh
(A217131522066)
Aim:
To configure the intrusion detection system (snort).
Theory:
Intrusion Detection System (IDS)
An Intrusion Detection System is a software or a system that monitors network
traffic and detects an intrusion or unwanted activities in the network. IDS scans
the networks to find out if someone is trying to penetrate the network illegally.
In other words, it keeps an eye on the network’s traffic to identify intrusion in
the network.
Intrusion Detection System if properly configured will help you to:
Monitor inbound and outbound network traffic.
• Analyse the patterns in the network continuously.
• Send an alarm immediately after detecting unwanted intrusion and
activities in the network.
• Organisations must properly install IDS into their system. The IDS must
analyse the normal traffic on the network.
Different types of Intrusion Detection Systems
Different types of Intrusion Detection systems are classified on the basis of
different techniques and methods.
1) Network Intrusion Detection System (NIDS)
Network Intrusion Detection System sets up across the network at a specific
planned point. NIDS monitors the traffic on the network from all devices.
Similarly, it examines the traffic passing on the entire subnet and verifies it with
the packet metadata and content. If NIDS detects any intrusion in the network, a
warning alert is sent to the admin of that network. The best advantage of NIDS
is that if it is installed in the same location where the firewall is located, then it
will detect if someone is trying to attack the firewall. In other words, with the
help of NIDS, the firewall will also be protected from any policy breaching.
2) Host Intrusion Detection System (HIDS)
Host Intrusion Detection System (HIDS) on independent networked devices.
HIDS examines the incoming and outgoing traffic of the device only. It detects
suspicious activities on the device and alerts the administrator. HIDS also
checks whether system files are misplaced or not, for that it takes the screen
capture of the current file system and verifies it with the screen capture of the
previous file system. This file system stores the analytical information of
network traffic.
3) Protocol-based IDS (PIDS)
Organisations set up a Protocol-based Intrusion Detection System at the front
end of the server. It interprets the protocols between the server and the user.
PIDS monitors the HTTPS server regularly to secure the web. Similarly, it
allows the HTTP server which is related to the protocol.
4) Application Protocol-based IDS (APIDS)
PIDS is set up at the front end of the server. Similarly, APIDS is set up within a
group of servers. It interprets communication with the applications within the
server to detect the intrusion.
5) Hybrid Intrusion Detection System
Hybrid Intrusion Detection system is a mixture of two different IDS. Hybrid
System develops a network system by combining host agents with network
information.
Hybrid System is more responsive and effective as compared to other IDS.
Types of Intrusion Detection Systems Methods
There are 2 main Intrusion Detection methods to identify malicious attacks or
intrusion.
Signature-based Intrusion Detection Method
The IDS developed the Signature-based intrusion detection method to examine
the network traffic and to detect attack patterns. It verifies the network traffic
with the log data to identify the intrusion. If this method detects any intrusion
then the IDS solution creates a signature of it and adds it to the list. The patterns
which are detected are known as sequences and these sequences are a specific
number of bytes or a set of 0’s and 1’s in the network. However, it is easy to
detect the attacks whose patterns exist in the system in the form of signatures.
But to detect new attacks whose signature is not yet created is difficult.
Anomaly-based Intrusion Detection Method
It is difficult to detect unknown or new malware attacks with the help of the
Signature-Based Detection method. Therefore, organisations use the anomaly-
based intrusion detection method to identify those new and unknown suspicious
attacks and policy breaching which the Signature-based detection method
cannot identify easily. However, new intrusion techniques and malware are
increasing rapidly. This method uses Machine learning to create an activity
model. If this method detects any receiving patterns which are not found in the
model, then the method declares these patterns as malicious patterns. In
conclusion, the anomaly-based detection system is better in comparison to the
Signature-based method.
Tool:
Parrot
Procedure:
Install snort Using apt-get
Update apt database with apt-get using the following command.

sudo apt-get update

After updating apt database, we can install snort using apt-get by running the
following command:

sudo apt-get -y install snort


Install vim

Then we have to add the rules.


Then ping the any ip address from the kali and then see the output on Ubuntu .
Use snort to Detect the packets

Common questions

Powered by AI

The Hybrid Intrusion Detection System combines the features of different Intrusion Detection Systems to enhance security measures. It integrates host agents with network information to create a more comprehensive monitoring framework. The combination allows Hybrid Systems to be more responsive and effective compared to either Network Intrusion Detection Systems (NIDS) or Host Intrusion Detection Systems (HIDS) alone. By leveraging both host-based and network-based data, Hybrid IDS can provide enhanced detection by covering the weaknesses of one system with the strengths of another, thereby providing a more robust security solution .

Parrot is a powerful Linux distribution used for penetration testing, security research, and development. It provides a robust environment for configuring intrusion detection systems such as Snort. The utility of Parrot lies in its comprehensive toolset for cybersecurity tasks, making it suitable for setting up and testing IDS configurations. However, potential limitations include the learning curve associated with mastering Parrot's extensive features and configurations for new users. Additionally, while Parrot can handle many testing environments, its specificity might require complementary tools or scripts to fully utilize Snort's capabilities in complex network setups .

Configuring Snort as an Intrusion Detection System (IDS) contributes to network protection by enabling the monitoring of inbound and outbound network traffic for suspicious activities. Snort, when properly configured, analyzes network traffic, compares it against defined rules, and can immediately alert administrators of identified intrusions or suspicious patterns. This helps in proactively managing threats by intercepting potentially harmful traffic before intrusions can affect network resources. The ability to update rules actively also allows Snort to adapt to emerging threats, maintaining the network's security posture against continuously evolving attack vectors .

A Protocol-based Intrusion Detection System (PIDS) is particularly advantageous in scenarios where monitoring and securing server communication is critical. PIDS is set up at the front end of a server to interpret the protocols between the server and the users, such as monitoring HTTPS server communications. This makes PIDS highly effective for organizations that need to secure web applications against protocol-specific vulnerabilities by continuously examining the traffic for protocol deviation or breaches . PIDS ensure that only correct protocol usage is allowed, which helps in maintaining secure transactions and communication integrity in protocol-heavy environments.

An organization might prefer an anomaly-based intrusion detection method over a signature-based method because anomaly-based methods can detect new and unknown malware attacks that have not yet been cataloged by signature detection. Anomaly-based IDS use machine learning to create models of normal network behavior, and any deviation from this model is flagged as potentially malicious. This enables the detection of novel attack patterns that signature-based systems, which rely on predefined attack patterns or sequences, might miss . As new intrusion techniques and malware rapidly evolve, anomaly-based detection provides a proactive approach to cybersecurity by identifying behavior that deviates from the established norm.

Network Intrusion Detection Systems (NIDS) are installed at a planned point across the network to monitor traffic from all devices within the network. They examine the traffic passing through the entire subnet and verify it with packet metadata and content. If any intrusion is detected, NIDS sends an alert to the network administrator . In contrast, Host Intrusion Detection Systems (HIDS) are installed on individual devices within the network. HIDS examine incoming and outgoing traffic specific to a device, and they can detect suspicious activities on that device. Additionally, HIDS can take screenshots of the current file system state and compare them with previous states to identify anomalies . Thus, the primary difference lies in their point of focus: NIDS monitors network-level traffic, while HIDS focuses on device-specific monitoring.

Machine learning plays a critical role in Anomaly-based Intrusion Detection Systems (IDS) by enabling the creation of activity models that define 'normal' behavior on a network. These models are generated by analyzing extensive datasets of permissible user and system interactions. Machine learning algorithms can then detect deviations from this baseline, identifying potential threats by flagging abnormal patterns. This approach enhances threat detection by allowing the system to recognize new or subtle variations in attack vectors that signature-based methods might miss, adapting to the ever-evolving landscape of cybersecurity threats with greater precision and resilience .

The Signature-based Intrusion Detection Method is limited in modern cybersecurity environments due to its reliance on predefined attack patterns or signatures. While effective at detecting known threats, it struggles with new or evolving threats whose signatures have not yet been documented. This method requires constant updates to the signature database to remain effective, which can lead to slower response times to emerging threats. Additionally, it cannot detect zero-day exploits or sophisticated attacks that do not have a recognizable pattern, making it potentially inadequate in rapidly changing threat landscapes where novel attack vectors continually emerge .

A Host Intrusion Detection System (HIDS) offers the distinct advantage of monitoring the integrity of system files, which is not typically within the purview of Network Intrusion Detection Systems (NIDS). HIDS can take system snapshots and compare them to detect changes to file integrity, alerting administrators to unauthorized modifications or anomalies in system files. This file-level monitoring capability makes HIDS particularly suitable for safeguarding against malicious activities that specifically target host-level vulnerabilities. NIDS, in contrast, focuses on network-wide traffic and lacks detailed visibility into individual host file systems .

The implementation of an Anomaly-based Intrusion Detection System (Anomaly-based IDS) presents several challenges. One major challenge is the potential for high false-positive rates, as normal network behavior can exhibit fluctuations that might be flagged as anomalies. Also, creating an accurate model of 'normal' behavior requires extensive, representative data and significant computational resources. Unlike signature-based systems, which require updates when new threats are identified, anomaly-based systems necessitate continual learning and adaptation to avoid both overfitting to old data and missing new trends in normal behavior. Balancing sensitivity to detect novel threats while minimizing inaccuracies in detection is also a key challenge .

You might also like