SlideShare a Scribd company logo
1
2
SNORT
Name
Institution
Corse
Tutor
Date
Introduction
What is snort?
Snort is a leading open-source intrusion prevention system used
in the world of technology. The snort intrusion and prevention
system followed outlined rules to help in defining malicious
network activities. With technological advancements, intruders
are using highly sophisticated attacks than defenses. Despite
having essential elements of network security topology such as
router-based and firewall packet filtering, they are not capable
of ensuring network typology security on their own. Security
experts are therefore focusing on detection systems and
intrusion prevention systems (Gaddam and Nandhini, 2017)
Creation & history
Created in 1998
Martin Roesch invented the snort in 1998. By then, he was the
CEO of a crossfire company. Martin Roesch invented the snort
in 1998. By then, he was the CEO of a crossfire company. Snort
is a free source intrusion detection software that constitutes a
packet sniffer that monitors network traffic to scrutinize any
harmful anomalies (Kaur et al, 2022). Snort as the leading open-
source project started as a small application. Today, many
people have adopted snort both on a commercial basis and for
private use. Evidence shows that Snort has two million times
from its official website. Martin Roesch is the founder and
former CTO of Sourcefire even though, snort is now developed
by Ciscom after it purchased Sourcefire in 2013. Snort was
introduced into InfoWorld's open-source software in 2009 as the
leading open-source software of all time (Thapa and Mailewa,
2020).
Pcap origin
Pcap, also known as libpcap, is an application tool widely used
in internet protocol to manage traffic sniffers, analyze packet
logging, search and match content, and perform protocol
analysis. A network research-based group originally invented it
at Lawrence Berkeley Lab (Estrada, 2017)
Cisco Acquisition
Cisco Systems acquired the Sourcefire Company in 2013, whose
major objective was to create innovations to the open-source
detection systems to provide comprehensive and efficient
network defense solutions (Shahi, 2018).
Value to network admins
Open-source nature
Snort is a strong open-source system that is both intrusion
detective and preventive. It uses the admin-assigned language
that involves signature inspection procedures, anomalies, and
protocols to detect malicious activities. Snort enables its admins
to identify distributed and denial of service attacks (Dos),
buffer overflows, Common Gateway interface attacks (CGI),
and malicious port scans (Fei, 2022). Snort designs multiple
rules that alert the users of malicious network activities and
packets. Rules for creating snort are generally easy to create
and implement and can be deployed in any kind of network
environment or business organization. Admin creates a series of
rules in a snort that enables it to perform various actions. For
instance, snort carries out packet sniffing, whereby it collects
individual packets from network devices to monitor traffic
transmission. Snort also works on configuration issues after
logging traffic.
Consistent rule updates
Snort contains the rule actions in its configuration file to define
unusual activities and generate alerts to network admins. Snort
enables the admin to consistently add or create new rules to the
software (Fei, 2022). Therefore, this allows the users to convert
the snort and define the processes it should carry out according
to their desires. The network admins may create rules that tell
the snort to monitor packets, prevent or minimize backdoor
attacks, make specifications for each network, and print alerts.
Overview of important features
Snort consists of multiple features that enable network admins
to watch out for potential malicious network activities and
monitor their systems efficiently.
Traffic monitoring
Snort has a traffic monitoring feature that controls and monitors
the traffic that moves in and out of a network system. In case of
any activities that threaten internet protocol networks, it alerts
the network admins in real-time.
Packet Logging
Snort consists of a packet logging mode that enables the admin
to log packets into disks. Snort systematically collects and logs
each packet in the packet logger mode depending on the
hierarchical order based on the user network's IP address (Fei,
2022).
OS fingerprinting
Different network platforms have unique internet protocol
stacks, including OS fingerprinting. Snort, therefore, can be
efficiently used to determine the kind of operating system used
by a system that accesses a particular network.
Conclusion
This paper has provided the practical knowledge of snort, and
how it addresses security concerns. It has also provided the
history of the Snort, value to network admins, and important
features. Snort is highly advantageous to admin networkers and
organizations due to its efficiency in detecting malicious
network activities. It is highly customizable due to its open-
source nature and enables users to distinguish between normal
internet activities and malicious activities.
References
Kaur Chahal, J., Bhandari, A., & Behal, S. (2019). Distributed
denial of service attacks: a threat or challenge. New Review of
Information Networking, 24(1), 31-103.
Estrada, V. D. C. (2017). Analysis of Anomalies in the Internet
Traffic Observed at the Campus Network Gateway. arXiv
preprint arXiv:1706.03206.
Shahi, M. A. H. (2018). Tactics, Techniques, and Procedures
(TTPs) to Augment Cyber Threat Intelligence (CTI): A
Comprehensive Study.
Fei, W. (2022). RASPBERRY HOUSE: AN INTRUSION
DETECTION AND PREVENTION SYSTEM FOR THE
INTERNET OF THINGS (IOT).
Gaddam, R., & Nandhini, M. (2017, March). An analysis of
various snort-based techniques to detect and prevent intrusions
in networks proposal with code refactoring snort tool in Kali
Linux environment. In 2017 International Conference on
Inventive Communication and Computational Technologies
(ICICCT) (pp. 10-15). IEEE.
Thapa, S., & Mailewa, A. (2020, April). The role of intrusion
detection/prevention systems in modern computer networks: A
review. In Conference: Midwest Instruction and Computing
Symposium (MICS) (Vol. 53, pp. 1-14).
12SNORTNameInstitutionCorseTutorDa

More Related Content

More from EttaBenton28

1Child Development Observation and Reflection
1Child Development Observation and Reflection1Child Development Observation and Reflection
1Child Development Observation and Reflection
EttaBenton28
 
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
EttaBenton28
 
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
EttaBenton28
 
1CHAPTER 01G L O B A L R E P O R T O N2G
1CHAPTER 01G L O B A L  R E P O R T  O N2G1CHAPTER 01G L O B A L  R E P O R T  O N2G
1CHAPTER 01G L O B A L R E P O R T O N2G
EttaBenton28
 
1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous
EttaBenton28
 
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
EttaBenton28
 
1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the
EttaBenton28
 
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
EttaBenton28
 
1Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond21Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond2
EttaBenton28
 
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
EttaBenton28
 
1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a
EttaBenton28
 
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
EttaBenton28
 
1Chapter 3 JAPANIntroductionJAPAN is an island countr
1Chapter 3 JAPANIntroductionJAPAN is an island countr1Chapter 3 JAPANIntroductionJAPAN is an island countr
1Chapter 3 JAPANIntroductionJAPAN is an island countr
EttaBenton28
 
1Chapter 10The InternetMass Communication Gets
1Chapter 10The InternetMass Communication Gets 1Chapter 10The InternetMass Communication Gets
1Chapter 10The InternetMass Communication Gets
EttaBenton28
 
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem 1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
EttaBenton28
 
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
EttaBenton28
 
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
EttaBenton28
 
1Change Proposal Summary ReportJessica RamosCapell
1Change Proposal Summary ReportJessica RamosCapell1Change Proposal Summary ReportJessica RamosCapell
1Change Proposal Summary ReportJessica RamosCapell
EttaBenton28
 
1Case Study Cystic FibrosisCystic Fibrosis Case Study
1Case Study Cystic FibrosisCystic Fibrosis Case Study1Case Study Cystic FibrosisCystic Fibrosis Case Study
1Case Study Cystic FibrosisCystic Fibrosis Case Study
EttaBenton28
 
1Causes and Effects of Literature Review ChallengesJamiah
1Causes and Effects of Literature Review ChallengesJamiah 1Causes and Effects of Literature Review ChallengesJamiah
1Causes and Effects of Literature Review ChallengesJamiah
EttaBenton28
 

More from EttaBenton28 (20)

1Child Development Observation and Reflection
1Child Development Observation and Reflection1Child Development Observation and Reflection
1Child Development Observation and Reflection
 
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
 
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
 
1CHAPTER 01G L O B A L R E P O R T O N2G
1CHAPTER 01G L O B A L  R E P O R T  O N2G1CHAPTER 01G L O B A L  R E P O R T  O N2G
1CHAPTER 01G L O B A L R E P O R T O N2G
 
1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous
 
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
 
1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the
 
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
 
1Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond21Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond2
 
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
 
1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a
 
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
 
1Chapter 3 JAPANIntroductionJAPAN is an island countr
1Chapter 3 JAPANIntroductionJAPAN is an island countr1Chapter 3 JAPANIntroductionJAPAN is an island countr
1Chapter 3 JAPANIntroductionJAPAN is an island countr
 
1Chapter 10The InternetMass Communication Gets
1Chapter 10The InternetMass Communication Gets 1Chapter 10The InternetMass Communication Gets
1Chapter 10The InternetMass Communication Gets
 
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem 1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
 
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
 
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
 
1Change Proposal Summary ReportJessica RamosCapell
1Change Proposal Summary ReportJessica RamosCapell1Change Proposal Summary ReportJessica RamosCapell
1Change Proposal Summary ReportJessica RamosCapell
 
1Case Study Cystic FibrosisCystic Fibrosis Case Study
1Case Study Cystic FibrosisCystic Fibrosis Case Study1Case Study Cystic FibrosisCystic Fibrosis Case Study
1Case Study Cystic FibrosisCystic Fibrosis Case Study
 
1Causes and Effects of Literature Review ChallengesJamiah
1Causes and Effects of Literature Review ChallengesJamiah 1Causes and Effects of Literature Review ChallengesJamiah
1Causes and Effects of Literature Review ChallengesJamiah
 

12SNORTNameInstitutionCorseTutorDa

  • 1. 1 2 SNORT Name Institution Corse Tutor Date Introduction What is snort? Snort is a leading open-source intrusion prevention system used in the world of technology. The snort intrusion and prevention system followed outlined rules to help in defining malicious network activities. With technological advancements, intruders are using highly sophisticated attacks than defenses. Despite having essential elements of network security topology such as router-based and firewall packet filtering, they are not capable of ensuring network typology security on their own. Security experts are therefore focusing on detection systems and intrusion prevention systems (Gaddam and Nandhini, 2017) Creation & history Created in 1998 Martin Roesch invented the snort in 1998. By then, he was the CEO of a crossfire company. Martin Roesch invented the snort in 1998. By then, he was the CEO of a crossfire company. Snort is a free source intrusion detection software that constitutes a
  • 2. packet sniffer that monitors network traffic to scrutinize any harmful anomalies (Kaur et al, 2022). Snort as the leading open- source project started as a small application. Today, many people have adopted snort both on a commercial basis and for private use. Evidence shows that Snort has two million times from its official website. Martin Roesch is the founder and former CTO of Sourcefire even though, snort is now developed by Ciscom after it purchased Sourcefire in 2013. Snort was introduced into InfoWorld's open-source software in 2009 as the leading open-source software of all time (Thapa and Mailewa, 2020). Pcap origin Pcap, also known as libpcap, is an application tool widely used in internet protocol to manage traffic sniffers, analyze packet logging, search and match content, and perform protocol analysis. A network research-based group originally invented it at Lawrence Berkeley Lab (Estrada, 2017) Cisco Acquisition Cisco Systems acquired the Sourcefire Company in 2013, whose major objective was to create innovations to the open-source detection systems to provide comprehensive and efficient network defense solutions (Shahi, 2018). Value to network admins Open-source nature Snort is a strong open-source system that is both intrusion detective and preventive. It uses the admin-assigned language that involves signature inspection procedures, anomalies, and protocols to detect malicious activities. Snort enables its admins to identify distributed and denial of service attacks (Dos), buffer overflows, Common Gateway interface attacks (CGI), and malicious port scans (Fei, 2022). Snort designs multiple rules that alert the users of malicious network activities and packets. Rules for creating snort are generally easy to create and implement and can be deployed in any kind of network environment or business organization. Admin creates a series of rules in a snort that enables it to perform various actions. For
  • 3. instance, snort carries out packet sniffing, whereby it collects individual packets from network devices to monitor traffic transmission. Snort also works on configuration issues after logging traffic. Consistent rule updates Snort contains the rule actions in its configuration file to define unusual activities and generate alerts to network admins. Snort enables the admin to consistently add or create new rules to the software (Fei, 2022). Therefore, this allows the users to convert the snort and define the processes it should carry out according to their desires. The network admins may create rules that tell the snort to monitor packets, prevent or minimize backdoor attacks, make specifications for each network, and print alerts. Overview of important features Snort consists of multiple features that enable network admins to watch out for potential malicious network activities and monitor their systems efficiently. Traffic monitoring Snort has a traffic monitoring feature that controls and monitors the traffic that moves in and out of a network system. In case of any activities that threaten internet protocol networks, it alerts the network admins in real-time. Packet Logging Snort consists of a packet logging mode that enables the admin to log packets into disks. Snort systematically collects and logs each packet in the packet logger mode depending on the hierarchical order based on the user network's IP address (Fei, 2022). OS fingerprinting Different network platforms have unique internet protocol stacks, including OS fingerprinting. Snort, therefore, can be efficiently used to determine the kind of operating system used by a system that accesses a particular network. Conclusion This paper has provided the practical knowledge of snort, and
  • 4. how it addresses security concerns. It has also provided the history of the Snort, value to network admins, and important features. Snort is highly advantageous to admin networkers and organizations due to its efficiency in detecting malicious network activities. It is highly customizable due to its open- source nature and enables users to distinguish between normal internet activities and malicious activities. References Kaur Chahal, J., Bhandari, A., & Behal, S. (2019). Distributed denial of service attacks: a threat or challenge. New Review of Information Networking, 24(1), 31-103. Estrada, V. D. C. (2017). Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway. arXiv preprint arXiv:1706.03206. Shahi, M. A. H. (2018). Tactics, Techniques, and Procedures (TTPs) to Augment Cyber Threat Intelligence (CTI): A Comprehensive Study. Fei, W. (2022). RASPBERRY HOUSE: AN INTRUSION DETECTION AND PREVENTION SYSTEM FOR THE INTERNET OF THINGS (IOT). Gaddam, R., & Nandhini, M. (2017, March). An analysis of various snort-based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment. In 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT) (pp. 10-15). IEEE. Thapa, S., & Mailewa, A. (2020, April). The role of intrusion detection/prevention systems in modern computer networks: A review. In Conference: Midwest Instruction and Computing Symposium (MICS) (Vol. 53, pp. 1-14).