SlideShare a Scribd company logo
07/01/1307/01/13 11
A Simple Network IDSA Simple Network IDS
Team Members:Team Members:
Brian LappBrian Lapp
Dominic ReresDominic Reres
Bob WilsonBob Wilson
Daniel CassieroDaniel Cassiero
207/01/13
CRISIS!CRISIS!
307/01/13
About the ProjectAbout the Project
A demonstration of a simple IDS.A demonstration of a simple IDS.
Can be used to secure and protect aCan be used to secure and protect a
network.network.
Policy enforcement.Policy enforcement.
Snort Sensor
IDS Console
Relational Database
407/01/13
ImplementationImplementation
Windows XP Professional with SP2Windows XP Professional with SP2
Snort version 2.3.2Snort version 2.3.2
MySQL database version 4.1MySQL database version 4.1
ACID v .9.6b23ACID v .9.6b23
All components installed on a laptop forAll components installed on a laptop for
convenience.convenience.
507/01/13
Snort – The Open Source IDSSnort – The Open Source IDS
Highly PortableHighly Portable
(*NIX, BSD, Win32)(*NIX, BSD, Win32)
Uses “Signatures”Uses “Signatures”
Open SourceOpen Source
607/01/13
Snort - FlowSnort - Flow
Monitors network traffic in promiscuousMonitors network traffic in promiscuous
modemode
Packet has signature matchPacket has signature match
Event is logged to databaseEvent is logged to database
Alert appears on ACID consoleAlert appears on ACID console
707/01/13
Snort – Data LoggingSnort – Data Logging
Direct log fileDirect log file
Database (MySQL,Database (MySQL,
ORACLE, MSORACLE, MS
SQL...)SQL...)
807/01/13
DataData
Data captured from lab networkData captured from lab network
Attached snort sensor directly to CRJ LabsAttached snort sensor directly to CRJ Labs
907/01/13
Snort LogSnort Log
Log file format may be difficult to read.Log file format may be difficult to read.
Sorting through events may be timeSorting through events may be time
consuming.consuming.
1007/01/13
AAnalysisnalysis CConsole foronsole for IIntrusionntrusion DDatabasesatabases
GUI Frontend forGUI Frontend for
logged datalogged data
Human readable atHuman readable at
a glancea glance
Utilize relationalUtilize relational
data.data.
1107/01/13
SignaturesSignatures
Link to signature description on consoleLink to signature description on console
CVECVE
BugtraqBugtraq
SnortSnort
1207/01/13
Console AnalysisConsole Analysis
Easy analysis with coded regionsEasy analysis with coded regions
Simple example showing an Alert eventSimple example showing an Alert event
1307/01/13
Network IDS SolutionNetwork IDS Solution
Open Source softwareOpen Source software

Freely available to the publicFreely available to the public
OverheadOverhead

Configuration and setupConfiguration and setup

Learning curveLearning curve
1407/01/13
SummarySummary
SnortSnort

Network Sensor IDSNetwork Sensor IDS

SignaturesSignatures
MySQLMySQL

Relational DatabaseRelational Database
ACIDACID

SO ConsoleSO Console

Incident AlertIncident Alert
1507/01/13
ResourcesResources
SnortSnort

http://http://www.snort.orgwww.snort.org//
ACIDACID

http://acidlab.sourceforge.net/http://acidlab.sourceforge.net/
MySQLMySQL

http://www.mysql.org/http://www.mysql.org/
Analysis Console for Intrusion Databases

More Related Content

PPTX
Show me your kung fuzz
PPTX
實作Linux Driver移植在樹莓 Pi上:Linux Driver for STMicro LIS3DH
PDF
IoT mit Rust programmieren
PDF
HWallet: The simplest Bitcoin hardware wallet
PDF
A Stuxnet for Mainframes
PDF
DefCon 2012 - Hardware Backdooring (Slides)
PDF
Is Rust Programming ready for embedded development?
PPTX
Io t security and azure sphere
Show me your kung fuzz
實作Linux Driver移植在樹莓 Pi上:Linux Driver for STMicro LIS3DH
IoT mit Rust programmieren
HWallet: The simplest Bitcoin hardware wallet
A Stuxnet for Mainframes
DefCon 2012 - Hardware Backdooring (Slides)
Is Rust Programming ready for embedded development?
Io t security and azure sphere

Similar to A Simple Network IDS (20)

PDF
Security Onion: Peel Back the Layers of Your Network in Minutes
PDF
Security Onion: peeling back the layers of your network in minutes
PDF
Embedded device-care Point of View - security
PDF
Router Defense - BRUcon 2010
PDF
Security Lock Down Your Computer Like the National Security Agency (NSA)
PPTX
PMCS22-Roy-Evolving-Storage-For-New-Generation.pptx
PDF
Optical Disc Archive Install memo
PPTX
Oracle Database Appliance RAC in a box Some Strings Attached
PPTX
GoSF Jan 2016 - Go Write a Plugin for Snap!
PPT
Guardium Presentation
PPTX
IoT Labs
PDF
Unlocking the SDN and NFV Transformation
PPTX
Where Are All The ICS Attacks?
PDF
ICS Threat Scenarios
PPT
Attacking Embedded Devices (No Axe Required)
PDF
제3회난공불락 오픈소스 인프라세미나 - lustre
PPTX
InduSoft Database Redundancy Webinar
PDF
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
ODP
PDF
DEF CON 23 - NSM 101 for ICS
Security Onion: Peel Back the Layers of Your Network in Minutes
Security Onion: peeling back the layers of your network in minutes
Embedded device-care Point of View - security
Router Defense - BRUcon 2010
Security Lock Down Your Computer Like the National Security Agency (NSA)
PMCS22-Roy-Evolving-Storage-For-New-Generation.pptx
Optical Disc Archive Install memo
Oracle Database Appliance RAC in a box Some Strings Attached
GoSF Jan 2016 - Go Write a Plugin for Snap!
Guardium Presentation
IoT Labs
Unlocking the SDN and NFV Transformation
Where Are All The ICS Attacks?
ICS Threat Scenarios
Attacking Embedded Devices (No Axe Required)
제3회난공불락 오픈소스 인프라세미나 - lustre
InduSoft Database Redundancy Webinar
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
DEF CON 23 - NSM 101 for ICS
Ad

Recently uploaded (20)

PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
A Presentation on Touch Screen Technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
A Presentation on Artificial Intelligence
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
DP Operators-handbook-extract for the Mautical Institute
SOPHOS-XG Firewall Administrator PPT.pptx
Zenith AI: Advanced Artificial Intelligence
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A Presentation on Touch Screen Technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 5: Probability Theory and Statistics
Univ-Connecticut-ChatGPT-Presentaion.pdf
Web App vs Mobile App What Should You Build First.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Programs and apps: productivity, graphics, security and other tools
1 - Historical Antecedents, Social Consideration.pdf
TLE Review Electricity (Electricity).pptx
NewMind AI Weekly Chronicles - August'25-Week II
A Presentation on Artificial Intelligence
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Assigned Numbers - 2025 - Bluetooth® Document
DP Operators-handbook-extract for the Mautical Institute
Ad

A Simple Network IDS

Editor's Notes

  • #3: A need for network intrusion detection today
  • #4: Created a self-contained demo NIDS on a laptop for the project.
  • #5: Stuff that was used
  • #9: Picture is the snort schema
  • #12: Link gives a description of the vuln/exploit CVE – Common Vulnerabilities and Exploits Bugtraq – Common database of vulnerabilities and exploits ICAT – just an acronym…doesn’t stand for anything anymore hosted by NIST National Institute for Standards in Technology
  • #13: Meta – Signature, time, sensor (Alert Group – ACID specific) IP – Source, Destination, IP Header info, FQDN (if DNS lookup available) TCP – Layer 4 information – TCP, UDP, ICMP sequence number Payload – the actual packet data
  • #14: This project demonstrates a viable network IDS solution All of the software used was low-cost open source software – PRO Small learning curve - CON
  • #15: Snort logs alerts to the MySQL database MySQL database is a relational database ACID reads the database and correlates it in an easily readable format.