Snort mailing list archives
Re: distributed snort
From: Michael Boman <michael () ayeka dyndns org>
Date: Wed, 3 Oct 2001 15:16:58 +0800
On Wed, Oct 03, 2001 at 11:17:34AM +0800, meling wrote:
Hi, I'm developing a distributed intrusion detection architecture using Snort on the IDS sensors. We're targeting to deploy > 50 sensors on multiple networks. These sensors will push the alert logs to 1 central console, where data crunching and analysis will take place. My questions are: 1. How feasible it is to send alert logs from 50 sensors to 1 central console? The central console will have several different components in itself, such as data parsing, etc.
Except that you have a single point of failure there is not much problem.. I would recommend to use something like barnyard once it has DB support, else a network outage will be quite servere.
2. What is the most efficient way to make sure that Snort is runnig 24x7 on the sensors? Is tcpserver any good?
supervise (daemontools) is a choice.. or if you are running linux just stick snort in /etc/inittab
3. What are the best data consolidation techniques available? My concern is that when too many data are displayed from various sensors on the monitoring console, security analyst will tend to ignore them.
You could limit your analysts to a certain number of sensors to monitor, so they wont get overwhelmed. What you have to look at is to limit the number of non-interesting/no-action alerts, as if they are not get anything interesting to look at they will start browing sites etc.. Make sure that there are procedures for your techichians to follow. Where we work things like portscans we basicly ignore, meaning that we won't delete them but at most we drop one of the standard letters to the ISP in charge. If we are getting attempted system/admin attempt or acctually a complete compromise the reaction will be quite different. Basicly, if they are looking for info about your host you put them in the suspected criminals basket. If they break in you call the police. People tend to do info gathering before attacking the host, hence we have a lookout for these people. Best regards Michael Boman -- There is no such thing as a system that is secure out of the box. Tim [Timothy M. Mullen, CIO of AnchorIS.Com] claimed earlier this morning that he had found one at WalMart the other day that was secure out of the box, but as it turns out that was a Nintendo. -- Jesper M Johansson, Ph.D. Assistant Professor of Information Systems at Boston University - during a SANS audio broadcast _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- distributed snort meling (Oct 02)
- Re: distributed snort Michael Boman (Oct 03)
- Re: distributed snort Erek Adams (Oct 03)
- Re: distributed snort Tim Hughes (Oct 09)
- Re: distributed snort Andreas Hasenack (Oct 09)
- <Possible follow-ups>
- RE: distributed snort Fraser Hugh (Oct 03)
