Signature Detection and Alerting an Admin

In the lab, you will learn how to create SNORT rules. SNORT rules are comprised of two sections: header and options. The rule’s header consists of a rule’s action, protocols, and ports. In this section, we will create a SNORT rule using logical header attributes inside of a test ruleset (local.rules). In this lab, you will also learn how to send an email message to alert an administrator when a significant threat is detected. 

outcomes:

In this lab, you will learn to:

  1. Create a rule in SNORT
  2. Test a SNORT rule
  3. Send an email alert to the administrator

videos:

Before you start this lab, review these videos.

Setting Up the Virtual Environment

Defining a SNORT Rule Comprised of Only the Header Section

Verifying It Works

Defining a SNORT Rule Comprised of Both the Header and Options Sections

Alerting an Admin

Overview

As stated in the IDS and Syslog lab, “Traffic flow fingerprints can be defined using layer specific header field values and or content derived from data. These fingerprints are known as signatures and can be defined through SNORT rules and stored in files called rulesets.” In this lab, we will create SNORT rules used to detect traffic flows. Because this is an IDS, it does not stop the attack from going through, but is designed to alert the presence of significant threats. We will also demonstrate how an IDS can alert a sysadmin via email when a significant threat is detected.

image001.png

Signature Detection and Alerting an Admin

Key terms and descriptions

syslog
Syslog is a Linux daemon that manages logs from different services.
snort
Snort has the ability to capture network traffic, process these requests, and analyze the legitimate and malicious web requests.
roundcube
Snort has the ability to capture network traffic, process these requests, and analyze the legitimate and malicious web requests.