[Original] we recommend that you use an intrusion test system + Active firewall --> snort + guardian
--------------------------------------------------------------------------------
Snort is an open-source lightweight intrusion monitoring system that monitors network exceptions and provides reports;Guardian is an active Firewall Based on Snort + iptables. It ana
Groupadd snortUseradd-g snort-s/bin/falsePasswd-S snortMkdir-p/etc/snort/rulesMkdir-p/var/log/snort/archiveChown-R snort. snort/var/log/snortCd etc; cp */etc/snortSnifferSnort-dev-VUsing this command, only the IP address and TCP/UDP/ICMP packet header information will be out
Install snort and base on Linux-Linux Enterprise Application-Linux server application information. For details, refer to the following section. Prerequisite: You need to access a vswitch with port ing.
Download and compile snort. Note that you need to add MySQL support.
$./Configure -- with-mysql =/usr
Download the rules file, including the registered user version, non-registered user version, and Commun
The local CentOS6.5 is installed to the maximum extent. the following components are required for installation after installation. 1. install libpcap and libpcap-develyum-yinstalllibpcap * 2. install libpcreyum-yinstallpcre * 3. to install libdnet, we recommend that you add the epel source before installing this component. for details, refer to: CentO
The local CentOS6.5 is installed to the maximum extent. the following components are required for installation after installation.
1. install libp
I am studying snort recently. I will record it here to avoid this damn brain. I always forget about it!
First, it is a brief introduction to snort.
Snort is an intrusion detection tool released by Alibaba CloudSource codeYou canCodeFor further development, Snort is an open-source network intrusion monitoring system.
Improved search rule options in Snort 2.x data Zone
Created:Article attributes: originalArticle submitted: stardust (stardust_at_xfocus.org)
The rule options of Snort 2.x have been greatly improved compared with those of earlier versions 2.0. It is necessary to introduce and analyze them.
First, translate the description of relevant rule options in the Snort user
I have installed snort and configured it more than once on Ubuntu. I have also referred to many articles. Therefore, I would like to summarize this experience:
Main reference http://www.howtoforge.com/intrusion-detection-with-snort-mysql-apache2-on-ubuntu-7.10
Because the above URL is very detailed, I will only talk about the problems I encountered during the installation and configuration process.
PS: when
Reprinted from "Snort Command parameter Details"Usage:snort-[options] Options:-a Unsock, detailed on a snort introduction. -b Save network packets with binary files to cope with high-throughput networks. b Erase IP address information and go private. -c read the configuration information for the run. -d Displays the application layer data for the package. -D runs snort
Reproduced from: "IPs analysis" snort grammar rules and examples explainedDirection operator:The direction operator, "," represents the direction of the flow applied by the rule. The IP address and port number on the left side of the direction operator is considered to be the source host where the flow comes from, and the IP address to the right of the direction operator is the destination host, and there is a bidirectional operator"Log! 192.168. 1.0/
Why can't I find the mstring. c file after installing snort with yum? -- Linux general technology-Linux technology and application information. For details, refer to the following section. In the past two days, we performed experiments and configured snort + LAMP + BASE on fedora14. Yum is used for automatic installation. The configuration is successful. Now I want to see the source code of the
Summarize the causes of the problem:
When I install snort, The./configure -- with-mysql = DIR path indicates a problem. My system has installed mysql
So when I reinstall it, I directly./configure -- with-mysql, and uninstall the snort before the reinstall.
Re-configure, make, make install. When you run snort again, you will find that the database is correctly
Ubuntu11.04 install Snort record: 1. sudoapt-getinstallbuild-essential2. Install the latest gnum4, latest
Install Snort in Ubuntu 11.04:
1. sudo apt-get install build-essential
Install the latest gnu m4, http://ftp.gnu.org/gnu/m4/
3. install flex and bison. You can search and download them by yourself. You can also: sudo apt-get install bison and sudo apt-get install flex.
4. Install libpcap, http://ww
CentOS6.5 install snort
The local CentOS6.5 is installed to the maximum extent. The following components are required for installation after installation.
1. Install libpcap and libpcap-devel
Yum-y install libpcap *
2. Install libpcre
Yum-y install pcre *
3. Install libdnet
We recommend that you add the epel source before installing this component. For more information, see add an epel source in CentOS6.5.
Yum-y install libdnet *
4. download
is hard to achieve. People who do not know this field often think that IDS is like a omnipotent key to solve all security problems. For example, some organizations have spent a lot of money to purchase commercial IDS. Due to improper configuration, these companies have even false positives, which immediately fills the database with a large amount of packet loss and then crashes. This kind of attitude makes people think that everything is fine as long as IDS are randomly placed on the Internet,
To sum up the cause of the previous problem: When I installed snort, the path of. configure -- with-mysqlDIR indicated a problem. My system has installed mysql, so
To sum up the cause of the problem: When I install snort, the path of./configure -- with-mysql = DIR indicates a problem. My system is already installed with mysql, so
Summarize the causes of the problem:
When I install
Install and solve the SNORT source code in Ubuntu9.10: first, install Libpcap in Linux. refer to the following article. libpcap is a network packet capture function package on unix/linux platforms. Libpcap provides a system-independent user-level network packet capture interface, fully considering the portability of applications. The Libpcap package can be downloaded from www.tcpdump.org/. then, install the following three commands, as shown in
Instal
Script attacks are the most crazy attack methods on the network recently. Many servers are equipped with advanced hardware firewalls and multi-level security systems, unfortunately, there is still no way to defend against SQL injection and cross-site scripting attacks on port 80. We can only watch the data being changed by malicious intruders without any solution-arm your Snort, use it to detect such attacks!We will use the open-source Intrusion Detec
In the description
CodeFirst, let's take a look at the overall module diagram of snort.
In the decode module, data packets obtained from libpcap are converted to the Snort System definition, which facilitates the system to analyze the packet. According to the different protocol types in the IP header (ipproto_tcp, ipproto_udp, ipproto_icmp. During parsing, Snort
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.