Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

INTRUSION DETECTION SYSTEM USING SNORT

J.P Navani1, Sheo Kumar2, Sonal Sapra3,

Anjali Sharma4, Swati Singh5

1, 2,3,4,5 RKGITW

Abstract: Security is a big issue for all able to find and log suspicious activity and
networks in today’s enterprise environment. generate alerts. Anomaly-based intrusion
Hackers and intruders have made many Detection usually depends on packet
successful attempts to bring down high- anomalies present in protocol header parts.
profile company networks and web services. In some cases these methods produce better
Many methods have been developed to results compared to signature-based IDS.
secure the network infrastructure and Usually an intrusion detection system
communication over the Internet, among captures data from the network and applies
them the use of firewalls, encryption, and its rules to that data or detects anomalies in
virtual private networks. Intrusion detection it .Snort uses rules stored in text files that
is a relatively new addition to such can be modified by a text editor. Rules are
techniques. The advantage of this approach grouped in categories. Rules belonging to
is that it provides a global and each category are stored in separate files.
comprehensive context in which to describe These files are then included in a main
intrusion detection system (IDS). Snort is configuration file called snort.conf. Snort
primarily a rule-based IDS, however input reads these rules at the start-up time and
plug-ins are present to detect anomalies in builds internal data structures or chains to
protocol headers. This paper presents the apply these rules to captured data. Snort
intrusion detection and vulnerability comes with a rich set of pre-defined rules to
scanning capabilities that are considered detect intrusion activity and we are free to
necessary for the network. add our own rules at will. We can also
Index term: Intrusion detection, remove some of the built-in rules to avoid
vulnerability scanning, architecture, IDS, false alarms.
snort.
II. Where IDS should be Placed in
I. Introduction: Network Topology?

Intrusion detection is a set of techniques Depending upon our network topology, we


and methods that are used to detect may want to position intrusion detection
suspicious activity both at the network and systems at one or more places. It also
host level. Intrusion detection systems fall depends upon what type of intrusion
into two basic categories: signature-based activities we want to detect: internal,
intrusion detection systems and anomaly external or both. If we want to detect only
detection systems. Intruders have signatures, external intrusion activities, and we have
like computer viruses, that can be detected only one router connecting to the Internet,
using software. Based upon a set of the best place for an intrusion detection
signatures and rules, the detection system is system may be just inside the router or a
firewall. If we have multiple paths to the
Internet, we may want to place one IDS box Transfer Protocol (FTP) server (port 21) and
at every entry point. However if we want to so on. We should place the honey pot
detect internal threats as well, we may want somewhere close to our production server so
to place a box in every network segment. that the hackers can easily take it for a real
In many cases we don’t need to have server. We should be careful in creating an
intrusion detection activity in all network alert mechanism so that when our honey pot
segments and we may want to limit it only is compromised, we are notified
to sensitive network areas. More intrusion immediately. Ideally a honey pot should
detection systems mean more work and look like a real system. We should create
more maintenance costs. Our decision really some fake data files, user accounts and so on
depends upon our security policy, which to ensure a hacker that this is a real system.
defines what we really want to protect from This will tempt the hacker to remain on the
hackers. honey pot for a longer time and we will be
able to record more activity.

IV. Security zones & Level of trust:

The networks are divided into two broad


areas, secure area and unsecure area.
Sometimes this division also meant a
network is inside a firewall or a router and
outside our router. Now typical networks are
divided into many different areas and each
area may have a different level of security
policy and level of trust. Depending upon
the level of trust and our security policy, we
Fig.1. Typical locations for an intrusion should also have different policies and rules
detection system. for intruder detection in different areas of
our network. Network segments with
III. Honey pots: different security requirements and trust
levels are kept physically separate from each
Honey pots are systems used to lure hackers other. We can install one intrusion detection
by exposing known vulnerabilities system in each zone with different types of
deliberately. Once a hacker finds a honey rules to detect suspicious network activity.
pot, it is more likely that the hacker will
stick around for some time. During this time V. Components of Snorts:
we can log hacker activities to find out
his/her actions and techniques. Once we Snort is logically divided into multiple
know these techniques, we can use this components. These components work
information later on to harden security on together to detect particular attacks and to
our actual servers. There are different ways generate output in a required format from
to build and place honey pots. The honey the detection system. A Snort-based IDS
pot should have common services running consists of the following major components:
on it. These common services include Telnet • Packet Decoder
server (port 23), Hyper Text Transfer • Preprocessors
Protocol (HTTP) server (port 80), and File • Detection Engine
• Logging and Alerting System
• Output Modules

Packet Decoder-
The packet decoder takes packets from
different types of network interfaces and
prepares the packets to be preprocessed or to
be sent to the detection engine. The
interfaces may be Ethernet, SLIP, PPP and
so on.

Preprocessors-
Preprocessors are components or plug-ins
that can be used with Snort to arrange or
modify data packets before the detection
engine does some operation to find out if the
packet is being used by an intruder. Some
preprocessors also perform detection by
finding anomalies in packet headers and
generating alerts. Preprocessors are very
important for any IDS to prepare data
packets to be analyzed against rules in the Fig.2. Components of Snort.
detection engine.
VI. How to Protect IDS Itself?
The Detection Engine-
The detection engine is the most important One major issue is how to protect the system
part of Snort. Its responsibility is to detect if on which our intrusion detection software is
any intrusion activity exists in a packet. running. If security of the IDS is
compromised, we may start getting false
Logging and Alerting System- alarms or no alarms at all. The intruder may
Depending upon what the detection engine disable IDS before actually performing any
finds inside a packet, the packet may be attack. There are different ways to protect
used to log the activity or generate an alert. our system, starting from very general
Logs are kept in simple text files,or some recommendations to some sophisticated
other form. All of the log files are stored methods. Some of these are mentioned
under /var/log/ snort folder by default. below:
• The first thing that we can do is not to run
Output Modules- any service on our IDS sensor itself.
Output modules or plug-ins can do different Network servers are the most common
operations depending on how we want to method of exploiting a system.
save output generated by the logging and • New threats are discovered and patches are
alerting system of Snort. Basically these released by vendors. This is almost a
modules control the type of output generated continuous and non-stop process. The
by the logging and alerting system. platform on which we are running IDS
should be patched with the latest releases
from our vendor.
• If we are running Snort on a Linux System. He is working as Asso. Prof. in
machine, use netfilter to block any unwanted RKGITW. He has published a number of
data. Snort will still be able to see all of the research papers in various International and
data. National journals. His research interests are
Power system losses, Restructuring and
VII. Conclusion: Deregulation of Power. He is a Member of
IEEE and ISTE.
Intrusion detection is the process of Sonal Sapra has graduated in Electrical
monitoring the events occurring in a Engineering in 2003 from KIET, Ghaziabad
computer system or network and analyzing and received her M.Tech degree in 2007
them for signs of possible incidents, which from UPTU. Presently she is working as
are violations or imminent threats of Asst. Prof. in RKGITW Ghaziabad. She has
violation of computer security policies, published a number of research papers in
acceptable use policies, or standard security various International and National journals.
practices. Snort is primarily a rule based IDS Her research interests are Multilevel
which is used to perform intrusion detection Inverter, Power system losses and
and attempting to stop detected possible Deregulation of Power.
incidents. Intrusion detection systems (IDS) Anjali Sharma is a student of Final Year in
are primarily focused on identifying possible Raj Kumar Goel Institute of Technology for
incidents, logging information about them, Women, Ghaziabad. She has published a
attempting to stop them, and reporting them number of research papers in National and
to security administrators. International conference. Her research
interest include Power system losses, Smart
VIII. References: Grid, Artificial Intelligence, Data security
etc.
[1] Intrusion detection FAQ at Swati Singh is a student of Final Year in
http://www.sans.org/newlook/resources/IDF Raj Kumar Goel Institute of Technology for
AQ/ID_FAQ.htm Women, Ghaziabad. She has published a
[2] Honey Pot Project at number of research papers in National and
http://project.honeynet.org/ International conference. Her research
[3] Snort FAQ at interest includes Cryptography, Artificial
http://www.snort.org/docs/faq.html Intelligence, Data security etc.
[4]Honeyd Honey Pot at
http://www.citi.umich.edu/u/provos/honeyd/
[5] Cisco systems at http://www.cisco.com
[6]Checkpoint web site at
http://www.checkpoint.com
[7] Netfilter at http://www.netfilter.org
[8] Snort at http://www.snort.org

I X. Bibliography:

J.P Navani has received the B.Tech and


M.Tech degree in 1999 and 2001 from
D.Mendeelev University, Moscow.
Presently he is pursuing PhD in Power

You might also like