Network Intrusion
Network Intrusion
Conner Finlay
Josh Smith
Differences
• Protocol Analysis
• Policy Based
• Heuristic Based
Bro IDS/IPS
• Unix IDS
• Types of Alerts
o Log Alerts
o Real Time Alerts
o System Command Execution
• Packet Filtering
• Session Analysis
• Packet Manipulation
• IP Blocking
IPS Packet Filtering
IPTables Rule
Alert, Block, Pass, Drop, Reject
http://www.snort.org/docs/snort_htmanuals/htmanual_2832/
The Art of Writing Snort Rules
Basic Rule
./snort -vde
• NIDS Mode -
• Polymorphic Code
• Fragmentation Attacks
• Denial of Service
• http://secunia.com/advisories/20413/
Evasion Techniques (Cont.)
• TCP Splicing Attacks
o Passes payload over multiple packets
o Defeats pattern matching
Emerging Threats
• Open source collection of Snort rules that can be used by
any individual/company
• Received grant money from both the NSF and the Army
Research Office
• Examples of compression:
o Winzip, Winrar, Tar, Gzip, etc.
http://malforge.com/snort/output_all.zip
http://malforge.com/snort/userdb_all.zip
Questions, Comments, Conerns,
Criticisms?
Sources
• http://www.sans.org/resources/idfaq/id_vs_ip.php
• http://www.snort.org/about_snort/
• http://www.sans.org/reading_room/whitepapers/detection/
the_history_and_evolution_of_intrusion_detection_344?
show=344.php&cat=detection
• http://www.ece.drexel.edu/telecomm/Talks/thiel.pdf
• http://hogwash.sourceforge.net/docs/overview.html
• http://www.openinfosecfoundation.org/index.php/faq
• http://en.hakin9.org/attachments/hakin9_6-2006_str22-
33_snort_EN.pdf
• http://www.securityfocus.com/infocus/1514