What is Snort?
Snort is an open source network intrusion detection system (NIDS) that can audit network traffic in real-time. Snort is a packet sniffer, a packet logger, and a network intrusion detection system.
Snort as I mentioned before is an open source software which means it can be configured and complied on most operating systems. Snort has been ported over to Microsoft Windows operating systems also, but it's bread and butter is back on the UNIX/Linux side of the house. Most Linux distributions now include Snort as part of their install package, and though it may not be enabled by default, normally it is on the installation CD's or DVD's.
Should I run Snort if I have a firewall?
I believe that yes you should run a NDIS even with a firewall. Firewalls help to block packets coming in to your system, however if you are running different servers or services that require the firewall to let them through you are letting a large amount of data go un-audited. Snort has the ability to see trends in incoming data and identify them as a threat and take appropriate action on your system. Snort gives you the ability to see if you are being port scanned, or to see if someone is trying to abuse well known backdoors or problems in well known daemons. Running services and applications that help you to protect your system is always a good idea. Many system administrators run a firewall, snort, and a data file integrity checker (often Tripwire).
How does snort actually work?
Snort generally is running as a background application and it is constantly packet sniffing all the information passing through your network interface card (NIC). The data is then sorted by various preprocessors that basically sort the packet data in to different categories. Once the data has been sorted out it is run through the rules, or the detection phase. As Snort detects trends in the data it applies the rules and actions them appropriately. The final stages are logging the rule infractions and if configured alerting the system administration team in real-time as the infraction occurs.
Is Snort difficult to configure and use?
Snort, as mentioned before now often comes bundled or available through rpm's in most Linux distributions. The hard part of running snort is if you decide to create your own original rules which can get extremely complex. However, luckily for us you can download up to date rule sets for free off the Snort website (you must signup for the free registration).
For extra ease of use there are many different applications and log parsers which have been designed to work with Snort. These applications can create websites based on the data Snort has logged or help you identify trends or possibly security threats on your system.
Ken Dennis
http://kendennis-rss.homeip.net/
Need help making sense of algebra? Have algebra lectures in... Read More
This article illustrates the best practices to improve the performance... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More
And kill the best layout software in the process of... Read More
So, you've bought a new Macintosh, and now you may... Read More
Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More
One day, you suddenly realize that your computer started to... Read More
Are you a database professional? Do you work with a... Read More
Anyone who has ever used Microsoft Word knows that it... Read More
The purpose of one of our projects was MS Exchange... Read More
Sticky Noteshttp://www.deprice.com/stickynote.htmWith StickyNote 9.0, you can create beautiful 3D notes... Read More
Should one use Windows Update?This topic has good and valid... Read More
I like my software simple. If it's too complex or... Read More
Trying to figure out a stream in banning one email... Read More
Background: For many organizations like ours, the interim target of... Read More
Language development computer: Computer-based method for aiding language development seems... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Fleet Maintenance Management is a critical position in any company... Read More
If you have been using the Internet for any amount... Read More
Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More
In this small article we will be looking at the... Read More
Pirated software is on the increase and now accounts for... Read More
We would like to give you pluses and minuses of... Read More
It would be easy to think, like most people apparently... Read More
Mokena Chicago limo O'Hare ..Microsoft Great Plains has substantial mid-market share in the USA... Read More
In the real world a "fire wall" is a fireproof... Read More
Around the same time Microsoft made its move with .Net... Read More
IBM Lotus Notes Domino and Microsoft CRM (Client Relation Management)... Read More
Microsoft Great Plains is now standard mid-market ERP application, serving... Read More
There are several kinds of software piracy. The bottom line... Read More
Having from five to ten and more favorite screensavers is... Read More
Does Microsoft care for WebmastersIt's always been a problem with... Read More
The intuitive algorithm.Roger Penrose considered it impossible. Thinking could never... Read More
Just the thought of a duel-boot scares many people away,... Read More
Bill of Lading is required report for Logistics and Freight... Read More
The title of "software engineer" has got to be among... Read More
This article is for advanced Microsoft CRM SDK C# developers.... Read More
In a previous article, I wrote about OpenOffice... Read More
Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More
When you own a small business, time is money. And... Read More
This article is for advanced Microsoft CRM SDK C# developers.... Read More
What is 'adware'?Adware is basically software or scripts that are... Read More
TikiWiki is open source software - it is written in... Read More
This is a short article, written in question/answer/FAQ style to... Read More
Well, even if the combination might look very unusual, we... Read More
What is Spyware?Spyware monitors your surfing habits and sends the... Read More
If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More
I suggest that you do not spend a lot of... Read More
You have gotten those E_Mails buy software at deep discounts.... Read More
Software |