Snort mailing list archives
Very Large IDS implementations (was Re: RE: testing ids)
From: Bennett Todd <bet () rahul net>
Date: Mon, 17 Mar 2003 13:40:00 -0500
2003-03-17T12:26:32 Benjamin Hippler:
Has anyone experience with very large IDS implementations?
Me! Me! I have! Pick Me! (jumping up and down, waving hand)
It depends on what you mean by "very large IDS". There's one
direction of "large" that can't be tackled without some heavy-duty
engineering and some expensive kit: that's IDS monitoring a
high-bandwidth (>>200Mbps) links. For folks who want to do
everything IDSish with open source snort on commodity hardware, the
only way I know to hit big bandwidth is with a farm of snorters fed
via Toplayer switch. There may be other ways, but that's the one
I've heard about. Without a toplayer, snort can handle c. 50Mbps
untuned, as much as 250-300Mbps tuned on PCI bus, and possibly as
high as 500-600Mbps on PCIx with perfect tuning.
What I have done is a pretty big deployment with lots of servers
(>>50 sensors) world-wide. We planned things so each sensor had
under 50Mbps it was responsible for, and that brought it handily
into the reach of untuned snort on cheap 1U rackmounts, O Joy!.
In this space, the thing to do is pick your platforms and strategies
to match your experience and expertise and existing tooling.
We did snort on Red Hat 7.3, in-house rpmmed. The (separate)
snort-sigs rpm include, open-coded in the spec file, all our tuning,
expressed as a series of edits on various config files, with
dispatching to the appropriate config file by lookup in the init
script, along the lines of
cfg=/etc/snort/snort.conf
f=/etc/snort/`hostname`-snort.conf
test -f $f && cfg=$f
Add some additional tuning for finishing off the other per-device
tuning (bonding appropriate interfaces, setting the mgmt interface
IP addr, netmask, defaultrouter; setting the logserver) and
automatic package update, and you've got an enterprise appliance.
The key here is to pick a basis for building enterprise appliances
for which you have sufficient in-house expertise. If you don't have
it, then you want to buy a commercial solution. SourceFire would be
my first choice in that space.
Where can I find whitepapers, best practices,.. about this topic?
Beats me, I never looked for any. There are probably some relevent papers on snort.org, and I wouldn't be surprised if there weren't also some helpful material at securityfocus.org. -Bennett
Attachment:
_bin
Description:
Current thread:
- testing ids Julio (Mar 14)
- RE: testing ids Ray Ellington (Mar 14)
- RE: testing ids Ashley Thomas (Mar 14)
- RE: testing ids Jan van den Berg (Mar 14)
- RE: testing ids Ashley Thomas (Mar 14)
- RE: testing ids Ashley Thomas (Mar 14)
- RE: testing ids Ray Ellington (Mar 14)
- <Possible follow-ups>
- RE: testing ids Ray Ellington (Mar 14)
- testing ids Julio (Mar 17)
- RE: testing ids Brian Laing (Mar 17)
- RE: RE: testing ids Benjamin Hippler (Mar 17)
- Very Large IDS implementations (was Re: RE: testing ids) Bennett Todd (Mar 17)
- Re: Very Large IDS implementations (was Re: RE: testing ids) Andrea Barisani (Mar 17)
- Very Large IDS implementations (was Re: RE: testing ids) Bennett Todd (Mar 17)
- RE: RE: testing ids Benjamin Hippler (Mar 17)
- RE: RE: testing ids Miller, Eoin (Mar 17)
- RE: RE: testing ids Latha K (Mar 18)
- RE: testing ids Latha K (Mar 18)
