Snort mailing list archives
Re: Snort against DARPA Dataset
From: Robert Vineyard <vineyard () tuffmail com>
Date: Fri, 29 Jun 2012 11:49:19 -0400
On 6/29/2012 11:22 AM, Sravan Bhamidipati wrote:
1. Portscan.log: The default Snort logs do not contain sfportscan alerts. Is this by design or can this behavior be changed? I am using the preprocessor's logfile option for portscan-related attacks. How reliable are the port ranges and open ports in this log? Do they identify all ports or only a few ports? 2. Detection rates: I am using the 3-tuple (date, source IP, destination IP) as matching criteria for portscan-related attacks (portscan.log), and the 5-tuple (date, source IP, source port, destination IP, destination port) as a matching criteria for all other alerts. I see more than 30% of the labeled attacks going unidentified by Snort. Is this matching criteria correct or in some way too liberal or stringent?
IMHO, port-scan detection is much more easily and efficiently done using netflow analysis tools. I could be wrong, but I'd guess that's why you don't see a lot of feature enhancements to that preprocessor these days.
3. Ruleset: How different are the Snort subscriber's ruleset, Pulled Pork rules, and Emerging Threats ruleset? Would the detection rates improve if I used all rulesets together? (As I understand Snort ignores the older or duplicate rules.) In general are older signatures (from 1998/99) ever removed or only replaced by newer signatures in these rulesets?
Pretty different. There will inevitably be some overlap, but Pulled Pork can help you sort things out. It really depends on what you're looking for, so it's hard to say if one is "better" than another. If you're looking for *everything* then you're talking at least 40,000 rules - combining GPL + VRT + ET, and that's not even counting options from other third parties. To make that happen, you're going to need a ton of RAM, and some fairly significant horsepower to chew through that many signatures. I would say that with a task like that, your first job is to not drop packets. However, since you're replaying canned data, you already have the luxury of a 100% capture rate :-)
6. Is it fair to test any IDS against such old datasets?
Are those attacks still seen in the wild? If so, then a modern IDS should be able to detect something from 1998 with no problems. Just my 2c. -- Robert Vineyard ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users Please visit http://blog.snort.org to stay current on all the latest Snort news!
Current thread:
- Snort against DARPA Dataset Sravan Bhamidipati (Jun 29)
- Re: Snort against DARPA Dataset Robert Vineyard (Jun 29)