Snort
Author's note with contact information and more details on collegiate affiliation, etc.
This report is my own work. Any assistance I received in its preparation is acknowledged within, in accordance with academic practice. For any material, from whatever source, quoted or not, I have cited sources fully and completely and provided footnotes and bibliographical entries. The report was prepared by me for this class, has not been submitted in whole or significant part to any other class at UMUC or elsewhere, and is not to be used for any other purpose except that I may submit this material to a professional publication, journal, or professional conference. In adding my name to the following word "Signature," I intend that this certification will have the same authority and authenticity as a document executed with my hand-written signature.
Abstract
Snort was created by Martin Roesch in 1998. Sourcefire, Inc. is the company that provides Snort. Roesch is the founder and Chief Technical Officer of Sourcefire, Inc. Snort is free of charge. In 2009, InfoWorld entered Snort into its Open Source Hall of Fame as one of the greatest pieces of open source software of all time. Granted, the Internet has not existed as long as ancient ruins, yet still the accolade comes with a certain sense of gravity. The paper describes the primary traits and uses for Snort. The paper attempts to expose Snort's strengths and weaknesses as well as imagine the implementation in a relevant, yet hypothetical professional situation.
Comprehending and Using Snort
Snort is an open source network intrusion prevention system (NIPS). It is also an intrusion detection system (NIDS). There are two kinds of intrusion detection systems: signature-based intrusion detection systems and anomaly-based intrusion detection system. Snort is an example of a signature-based intrusion detection system. Ryan Trost provides a clear explanation as he writes:
"A signature-based IDS works by scanning through packets, looking for a particular set of well defined characteristics that, when seen together, typically constitute an attack in progress. As a result of this architecture, a signature-based IDS is only as good as its signatures; it cannot possibly detect attacks for which it has no signatures. A poorly written signature can either cause an enormous number of false positives or allow legitimate attacks to go undetected (commonly referred to as 'false negative')." (Trost, 2010,-Page 60)
Anomaly-based IDS requires a baseline of normal activity in order to discern what is normal activity and what is abnormal activity, thus necessitating an alert. Anomaly-based IDS searches for activity outside the prescribed parameters; or in other words, it searches for anomalies or anomalous activity before sending an alert. Signature-based IDS such as Snort constantly scan for dubious activity and then when noticed in conjunction with simultaneous suspicious network activity, detects a threat, alerts the system, and tries to eliminate the threat.
There are three primary uses for Snort. Snort can be used as a packet sniffer, a packet logger, or exclusively as a NIPS. When configured for sniffer mode, Snort reads network packets to display on the console. When configured for packet logger mode, Snort simply logs packets to the disk. When Snort is configured for intrusion detection mode, it monitors network traffic and analyzes the traffic against a specific ruleset defined by the individual user. Snort then performs a previously determined action as set in the parameters provided by the user. Users may configure Snort with the use of command lines as Roesch explains:
"Snort is configured using command line switches and optional Berkeley Packet Filter [BPF93] commands. The detection engine is programmed using a simple language that describes per packet tests and actions. Ease of use simplifies and expedites the development of new exploit detection rules…Snort's architecture is focused on performance, simplicity, and flexibility. There are three primary subsystems that make up Snort: the packet decoder, the detection engine, and the logging and alerting subsystem." (Roesch, 1998)
Snort is capable of several functions and configurations. Snort performs protocol analyses, content searching & matching, and Snort detects attacks and probes such as CGI attacks, OS fingerprinting attempts, and buffer overflows. Snort also proves useful for network traffic debugging. Snort is further capable of real-time traffic analysis on Internet Protocol (IP) networks. Snort has the potential to be of service in many different industries as well as to private citizens. Cox and Gerg succinctly describe the brief history of Snort as they write:
"Snort is perhaps the best known open source intrusion detection system available. Snort is designed...
Hypothetical Case Study Taking School Seriously As a social worker, it is never easy to remove a child from their home. This is especially true when the child is going to be placed into a group home setting. In a group home, children are left to operate as a unit, but for the most part are on their own. While there is always an adult on call to supervise, that adult is
Hypothetical Case Study Dieting This report provides insight into a hypothetical case study regarding dieting. The case involves a patient from this point forward called; X. She tends to consider herself as an individual that has been a life long 'on again' then 'off again' dieter. She informs a counselor that she has shown minor success with dieting where she may have lost a few pounds however; she feels that dieting
There is also the perpetual problem with qualitative research: namely because it is a single sample size, the study might only be representative of one particular population. However, some qualitative researchers argue that any type of research is subjective: they believe that even the approach of quantitative research disguises idiosyncratic aspects of reality and even the most rigorously empirical construct says more about a researcher's biases than an external reality.
This is significant, because it shows how such a policy, could help to refocus the industry and improve the amount of information that consumers have available to them. (McDonald's Second Quarter Rises 2010) Clearly, the proposal to increase fast food restaurant disclosure on calorie and other health information to consumers; can help to prevent the sharp increases in the obesity rate. This is because such polices have shown to: cause
Hypothetical Scenario Did Lennie cause the first officer's death? Distinguish between proximate cause and cause in fact. Are there any intervening causes? If so, are they superseding? Explain in detail every argument that could help Lennie and every argument that the prosecution is likely to use against him using only the concepts you learned in class. "Cause in fact requires that the defendant's negligent conduct was the actual cause of the plaintiff's
Hypothetical Case Involving the 4th Amendment Criminal Justice I am not sure how I would rule in this case. I would need to know more about the case such as if there was other evidence besides what was obtained with the heat sensor. I am not also familiar with the rules regarding police officers and the technology they can use on public property. Don't police officers position themselves on public property and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now