1. {elysiumsecurity}
INTRUSION DETECTION SYSTEM
HOW TO SETUP A HOME IDS
Version: 1.2a
Date: 29/03/2018
Author: Sylvain Martinez
Reference: ESC4-MUSCL
Classification: Public
cyber protection & response
2. {elysiumsecurity}
cyber protection & response
2
EXAMPLESETUPCONCEPTCONTEXT
• Overall Concept;
• How does it work?
• IDS Requirements;
• Sample Dashboard.
CONTENTS
Public
• Why setup an IDS?
• What is an IDS?
• What type of IDS?
• Simple Architecture;
• Installation;
• Traffic Duplication;
• Tuning;
• Enhanced
Architecture;
• Going Further;
3. {elysiumsecurity}
cyber protection & response
3
EXAMPLESETUPCONCEPTCONTEXT
WHY SETUP AN IDS?
Public
KNOW WHEN YOUR
NETWORK/COMPUTERS HAVE
BEEN COMPROMISED
IDENTIFY SUSPICIOUS
APPLICATION ACTIVITIES
KNOW WHEN YOUR
NETWORK/COMPUTERS ARE
UNDER ATTACK
4. {elysiumsecurity}
cyber protection & response
4
WHAT IS AN IDS?
Public
An Intrusion Detection System (IDS) is a device
or software application that monitors a network or
systems for malicious activity or policy violations.
Source: Wikipedia – Icons from the noun project unless specified otherwise
EXAMPLESETUPCONCEPTCONTEXT
5. {elysiumsecurity}
cyber protection & response
5
WHAT TYPE OF IDS?
Public
NETWORK IDS
NIDS
HOST IDS
HIDS
INTRUSION DETECTION SYSTEM
IDS
INTRUSION PREVENTION SYSTEM
IPS
EXAMPLESETUPCONCEPTCONTEXT
7. {elysiumsecurity}
cyber protection & response
7
HOW DOES IT WORK?
Public
10101010
11111110
10101010
11111110
10101010
11111110
INSPECT TRAFFIC DETECT THREAT GENERATE ALERT
SIGNATURES PATTERNS
IDS
ANALYSIS
NETWORK
TRAFFIC
INTERCEPTED
TRAFFIC
EXAMPLESETUPCONCEPTCONTEXT
8. {elysiumsecurity}
cyber protection & response
8
IDS REQUIREMENTS
Public
COVERAGE
TRACKING
TUNING
- Internal Network Activities
- (External Network -> IN)
- What IP generated the alert?
- What Host?
- What are you interested the most?
- Remove False Positives
EXAMPLESETUPCONCEPTCONTEXT
9. {elysiumsecurity}
cyber protection & response
9
SIMPLE ARCHITECTURE
Public
HOME NETWORK
IDS
INTERNET
Traffic
Analysis
Signatures
Patterns/
Behaviours
Security Alerts
Icons from VMWARE
EXAMPLESETUPCONCEPTCONTEXT
10. {elysiumsecurity}
cyber protection & response
10
INSTALLATION
Public
1. IDS CHOICE
- Security Onion (SO)
https://securityonion.net/
- SELKS:
https://www.stamus-networks.com/open-source/
2. PLATFORM SETUP
- Virtual Machine or Dedicated Server
- 2x Network ports (Manage/Monitor)
- Enough RAM (8Gb+) and Disk Space (50Gb)
- To run 24/7
3. INSTALLATION
- Best to keep default settings
- Know in advance which network port will be your
management port;
- Use testmyids.com to validate your installation
EXAMPLESETUPCONCEPTCONTEXT
11. {elysiumsecurity}
cyber protection & response
11
TRAFFIC DUPLICATION
Public
1. HARDWARE
- Netgear GS105E
- Mikrotik RB2011UiAS-2HnD-IN
- Ubiquity Networks UNIFI Switch
2. DUPLICATION
- Configure a TAP, SPAN or Mirror port
- FROM: connection to your Internet Gateway
- DESTINATION: Connection to your IDS Monitoring port
2. CONSIDERATION
- Careful of VLANs -> Extra IDS configuration
- Careful of NAT -> Limits visibility
Video Link for Netgear Setup: https://www.youtube.com/watch?v=kCSRgbEMkWs
EXAMPLESETUPCONCEPTCONTEXT
12. {elysiumsecurity}
cyber protection & response
12
TUNING
Public
1. TRACKING
- NAT DISABLED
- Fixed IP or
- Reserved DHCP
2. CONFIGURATION
- Local IP Subnet
- Define critical hosts
- Disable rules not needed
3. TUNING
- Review alerts regularly and act on false positives
- Rules Suppression
- Rules Trigger setup tuning
EXAMPLESETUPCONCEPTCONTEXT
13. {elysiumsecurity}
cyber protection & response
13
ENHANCED ARCHITECTURE
Public
HOME NETWORK
IDS
INTERNET
Traffic
Analysis
Signatures
Patterns/
Behaviours
Security Alerts
Icons from VMWARE
DHCP REQUEST
DHCP SERVER
ALLOWS IP
VISIBILITY
EXAMPLESETUPCONCEPTCONTEXT