[Snort-sigs] RE: [Snort-users] Who doesn't care about virus rules, and why?
WilliamsJonathan at ...2010...
Fri Nov 7 05:55:20 EST 2003
<grin> When I had to do this, we didn't have the snort version with thresholding options in it, so I did it the old-fashioned way. I wrote a perl script that runs from cron every 5 minutes. It keeps track of the number of lines seen so far and ignores everything but new entries in the tcpdump file. It does the thresholding via in-memory hashes, and then generates an SMTP message if a source address crosses the threshold. Since we've got multiple instances of snort running and one dedicated to monitoring this type of traffic, when I've got a new thing I'm looking for (i.e. CyberKit pings instead of TCP 135 connects), I add the rule to that instance and my X dests/Y time stuff just includes it.
I plan on playing with thresholding in the future, but so far, the job has kept me from playing :-(
From: Snortty [mailto:cwcwcwg at ...144...]
Sent: Thursday, November 06, 2003 10:38 AM
To: Iain Hallam; Williams Jon
Cc: snort-sigs at lists.sourceforge.net; snort-users
Subject: Re: [Snort-users] Who doesn't care about virus rules, and why?
Would you mind posting your rules to illustrate the
One objective for our snort IDS to be installed on our
network backborne is to be faster in respond to the
worm incidents like those ones occurred recently and
it would help great deal if your way really works.
Thanks in advance.
--- Iain Hallam <ccidsh at ...2009...> wrote:
> Williams Jon wrote:
> > What we've ended up doing is monitoring the
> default route path for
> > our network and watching for either TCP SYNs that
> are going places
> > they shouldn't or TCP RST packets generated either
> by the firewall or
> > the odd host that is actually hit. With
> thresholding, we can
> > generate fairly useful alerts in cases where, in
> Blaster's case, one
> > source address sends out TCP port 135 SYN packets
> to more than X
> > number of hosts in Y period of time. This is so
> reliable, in nearly
> > every case we've used it on, that we are able to
> auto-generate email
> > alerts that go to someone else to actually _deal_
> with the problem
> > rather than making the IDS staff track down and
> call each victim
> > independantly.
> We're doing something similar with ICMP on our
> network, but how can you
> tell the difference between large numbers of hosts
> and large numbers of
> packets to a single host? Would you mind posting one
> of your rules to
> illustrate the point?
> This SF.net email is sponsored by: SF.net Giveback
> Does SourceForge.net help you be more productive?
> Does it
> help you create better code? SHARE THE LOVE, and
> help us help
> YOU! Click Here: http://sourceforge.net/donate/
> Snort-users mailing list
> Snort-users at lists.sourceforge.net
> Go to this URL to change user options or
> Snort-users list archive:
Do you Yahoo!?
Protect your identity with Yahoo! Mail AddressGuard
This SF.net email is sponsored by: SF.net Giveback Program.
Does SourceForge.net help you be more productive? Does it
help you create better code? SHARE THE LOVE, and help us help
YOU! Click Here: http://sourceforge.net/donate/
Snort-users mailing list
Snort-users at lists.sourceforge.net
Go to this URL to change user options or unsubscribe:
Snort-users list archive:
More information about the Snort-sigs