StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

An Open Source Network Intrusion Detection System - Article Example

Cite this document
Summary
This paper 'an Open Source Network Intrusion Detection System' discusses the Snort as an open source network intrusion detection system (NIDS) that is noted for its effectiveness. Developed by Martin Roesch, Snort can also be used just as a packet logger or packet sniffer.”  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
An Open Source Network Intrusion Detection System
Read Text Preview

Extract of sample "An Open Source Network Intrusion Detection System"

What is Snort? It is defined as “An open source network intrusion detection system (NIDS) that is noted for its effectiveness. Developed by Martin Roesch, Snort can also be used just as a packet logger or packet sniffer” (Snort.2011).  Initially, Snort was used as a packet sniffer tool, in order to analyze and detect data packets on the network. However, as the tool matures, it was transformed as an Intrusion detection system. Moreover, the architecture of Snort comprises of four components i.e. packet decoder, preprocessor, detection engine and module with the features of logging and alerts.

The injection of Snort starts with the insertion of data packets via a network interface card along with the module named as ‘packet capture’. Likewise, the packet decoder determines the protocol of the packet. This process is conducted to check whether the protocol is matching the required proposal of protocols. However, in some cases, the packet decoder can construct a message if the packet header is abnormal or distorted, packet exceeds the size limit, parameters defining inappropriate protocols and vice versa (Paulauskas & Skudutis, 2008).

  As per the scenario, Snort will facilitate the investigation team with the following features: Snort will allow the investigation team to analyze in-depth network threats by detecting buffer overflows, port scanning, CGI attacks, SMB probing, NetBIOS requests and NMAP.  Likewise, the team will also be able to construct new signatures, in order to detect weaknesses in the system. Moreover, the team will translate packets in a human readable form from the IP addresses. Furthermore, the tool will deploy a passive trap for recording the current network traffic (What are the various features of snort? n.d).

A functional view of Snort is represented as Forensic investigators only have log files, audit trails and some physical evidences. However, any unusual activity in logs or audit trails indicates and provides sufficient information before a security breach takes place. Likewise, in order to evaluate live network traffic, a system is required to be configured on the network for monitoring live network traffic. Snort collects raw data packets from different network interfaces i.e. LAN, WAN, SLIP, PPP, VPN by deploying kernel named as ‘Libpcap’, in order to get prepared for preprocessing mechanism in the packet decoder.

Likewise, the preprocessor modifies data packets prior to their way to the detection engine, in order to analyze them and generate alerts for any possible anomalies associated with headers of the packets. Likewise, the core function of a preprocessor is to prepare or shape the network traffic for applying rules that are applicable at the next stage that is detection engine. This is usually called as packet defragmentation. Moreover, Snort also provides opportunities for investigators to decode HTTP, re construct TCP streams that are used for eliminating attacks.

The detection engine is based on time and operates in an extensive evidence collection mechanism. It is time- based because, if many rules are applied, the packet processing will consume time. In some cases, network transmission is too high and may result in packet drop. This will not make an investigation effective. The detection engine of Snort, stops’ processing, whenever, a rule is matched.  According to the defined parameters of a specific rule, the detection engine will log the packet or else generate an alert.

Consequently, before Snort generates an alert, it makes sure that all rules are matched. The next component of Snort known as the collection engine will collectivizes evidence from the hosts and networks that is an input for a forensic investigation team. However, the secondary data that can be used also as an input will probably the log files and audit trails which can be achieved from the applications. ‘Windup’ is a “freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire” (Windump.2007). The primary focus is to analyze and report issues related to packet headers in network traffic.

The tool is specifically developed for supporting functions related to digital forensics investigation. The tool can specifically analyze traffic broadcasting from workstation that has a malware installed in it. Likewise, it extracts the source information from the packet header in terms of IP addresses. Moreover, the tool can also facilitate the investigation tem to filter the required information. For instance, investigation team is currently analyzing SSL packets because of an online crime.

Consequently, the tool will only provide information related to SSL packets only and ignore the rest.  

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Auditing over LAN/WAN Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Auditing over LAN/WAN Research Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1431530-auditing-over-lan-wan
(Auditing over LAN/WAN Research Paper Example | Topics and Well Written Essays - 1500 Words)
Auditing over LAN/WAN Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1431530-auditing-over-lan-wan.
“Auditing over LAN/WAN Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1431530-auditing-over-lan-wan.
  • Cited: 0 times

CHECK THESE SAMPLES OF An Open Source Network Intrusion Detection System

Intrusion Detection System

The paper "intrusion detection system" tells us about IDS.... Working of the system in a network and the network traffic are monitored by the intrusion detection system.... Any abnormal activity has to be analyzed by the detection system.... intrusion detection is used to manage the system and the network in a secured manner.... intrusion detection systems are classified into two types.... Network-Based systems and Host-based intrusion detection systems are widely used....
11 Pages (2750 words) Essay

An improvement of Intrusion Detection System using HCI

People use intrusion detection system (IDS) applications as assistant tools to detect illegal activities that will cause damage to their computer systems or networks.... IDS users can be categorized from two perspectives: (1) their knowledge about network/system security management; and (2) the time and effort that they could put into intrusion detection.... Network/system specialists and administrators mostly know more about computer networks and systems than regular computer system owners....
14 Pages (3500 words) Essay

Cyber security

Data Mining for network intrusion detection: How to Get Started.... In view of the fact that Intrusion detection will be a costly activity or investment, even though they make use of an open source solution hence they need to spend an adequate amount of time to investigate, get, build up and put into practice to be far less than the in the general routine management of the information (Bandy, Money, & Worstell, Intrusion Detection FAQ: Getting Started, 2013)....
1 Pages (250 words) Coursework

A Network Intrusion Detection System and Security Attacks

The paper "A network intrusion detection system and Security Attacks" gives detailed information about the mark IDS technique, a system based interruption recognition framework.... A network intrusion detection system monitors networks for intrusions and attacks reporting any anomalies to the administrator.... hellip; intrusion detection has become an important sector.... intrusion detection systems (IDS) can effectively provide network security by preventing, detecting, and possibly fighting attacks....
7 Pages (1750 words) Assignment

IDS Systems - Snort and Bro

artin Roesch developed a NIDS (network intrusion detection system), which is mainly an open-source NIDS, and called as Snort.... The structure of this paper is as follows: first of all, an overview of the intrusion detection system is provided, the next two sections present an overview of the two IDS systems and after that, a comparison of these two IDSs is presented.... asically, an intrusion detection system is an application or device utilized to scrutinize the entire network traffic and notify the administrator or user when there has been an illegal effort or access....
12 Pages (3000 words) Case Study

Purpose of Intrusion Detection and Detection Techniques

According to Sundaram (1996) “an automatic intrusion detection that performs automated intrusion detection is acknowledged as an IDS or intrusion detection system” (Sundaram, 1996).... An intrusion detection system can be either network-based, in the host-based it checks system logs or calls, or network-based if it observes network packets flow during the commutation.... urpose of IDSs and Detection TechniquesAccording to Bradley (2009), an intrusion detection system is an application or device utilized to scrutinize the entire network traffic as well as alert the administrator or user when there has been an illegal effort or access....
5 Pages (1250 words) Coursework

Voice over IP Communication Systems

According to the paper 'Voice over IP Communication Systems' analysis VoIP intrusion detection as well as protection techniques suitable for the real-time interactive VoIP communication systems.... Nevertheless, various techniques have been incorporated in VoIP communication systems mainly to ensure security against data loss or intrusion and to structure ways of recovering data in case of data loss.... Unauthorized access attacks on the other hand imply that attackers gain the ability to access resources on a given network although they lack the legal authority to do it....
12 Pages (3000 words) Research Paper

A Network-Based Intrusion Detection System for ACME Software Solutions

… The paper “A Network-Based intrusion detection system for ACME Software Solutions” is a motivating variant of a lab report on information technology.... The paper “A Network-Based intrusion detection system for ACME Software Solutions” is a motivating variant of a lab report on information technology.... The networks main element will encompass the following: Firewall; NIDS (Network-based intrusion detection system); Web Server; Database Server; and installation....
13 Pages (3250 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us