Snort mailing list archives

Re: To check for current SNORT limitations in 2.9


From: Robert Muscat via Snort-users <snort-users () lists snort org>
Date: Sun, 29 Oct 2017 14:50:00 +0000


Hi,


Can someone confirm which of the below problems are still persistent in the stable version (not 3.0)


  *   Performance drops during heavy network traffic

  *   Adding additional snort instances and modifying snort configurations can lead to mistake magnification. So 
experienced users only can use it.


  *   Snort cannot detect UDP and TCP flooding attacks; it can only detect ICMP flooding attacks.

  *   When snort is in its active detection mode it will utilize 100% CPU and will slow down the performance of the 
system to a greater extent.


  *   In snort, graphical interface is not there by default and can be achieved only by adding extra plug-ins.


  *   By default snort will not provide any anomaly detection and is purely a misuse based system. Extra plug-in is 
required.


  *   While handling the normal traffic snort will process the packets at a slow phase. During a DoS and DDoS attack 
snort throughput increases drastically, but will drop large number of packet.


  *   When the number of rules increases, memory utilization also increases and hence will take longer to initialize 
all the rules.


  *   Snort checks each and every field specified in the rule and creates RTN, OTN for all the fields in the rule. 
Therefore it will decrease the processing throughput by performing several unnecessary comparisons with all the fields 
in the rule.


  *   Snort is capable of detecting flooding attacks by default. If snort needs to be configured to detect other modes 
of attacks then the configuration file have to be changed which indeed is a tedious task.


  *   Snort is purely an intrusion detection system and is not an intrusion prevention system.


  *   Snort will start to drop the packets at a massive rate when the incoming packet rate is more.Therefore 
possibilities of detecting possible attack patterns are more since it fails to analyze those dropped packets.

If there are more known issues, I appreciate you can forward them to me.

Thanks in advance!


_______________________________________________
Snort-users mailing list
Snort-users () lists snort org
Go to this URL to change user options or unsubscribe:
https://lists.snort.org/mailman/listinfo/snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Current thread: