The most powerful tool in Intrusion detection comes from Internet Security
Systems (ISS). It Produces a variety of tools like host sensor, OS sensor
and most powerful among all; network sensor. It also gives a very wide range
of activities that one need to track down for consideration into network
intrusion detection system

---Rajesh

-----Original Message-----
From: Varun Varma
To: multiple recipients of
Cc: [EMAIL PROTECTED]
Sent: 3/17/02 7:21 PM
Subject: Re: [ilugd]: Intrusion Detection System

Dear Raju,

That's what I like about snort - it can be scaled down from being a NIDS
to
a HIDS and it can be run either a logger like iplog or dynamic firewall
like portsentry or both. Can detect all the common attacks like scans,
smurfs, floods etc. Seems to have a far more configurable/powerfull
signature matching syntax then other things out there.

It is basically a IDS/Dynamic firewall in one package - kinda like iplog
and portsentry combined, which can be deployed over the entire network
[would have to be on the firewall box, or connected to the snoop port if
you just want logging] or just a single host.

Now, I am sure that you can get iplog and/or portsentry to do the same
by
fancy hacks, but that's another discussion.

My problem is this - snort seems to have the goods, but does it deliver?
Does it accurately detect attacks, does it report too many false
attacks,
does it just die out under heavy load?

Regards,
-Varun

-- 
Mindframe Software & Services Pvt. Ltd.,
A-50, Sector-39, NOIDA, U.P. - 201301, India

http://www.mindsw.com

> Hi Varun,
>
> Snort, iplog and portsentry are different tools for different
purposes:
>
> - Snort: full-blown network IDS.  Snoops packets on the ethernet and
> takes actions if it finds packets matching user-specified rules.
> Actions could include logging the connection, alerting an
> administrator, resetting the connection, etc.
>
> - Iplog: Only a IP packet logger for a single host.  Does not do
> anything except logging.  Is smart, so stops logging if it detects a
> flood.
>
> - Portsentry: Watches specific ports on your (single) server and takes
> appropriate action if activity is detected on them.  Usually used to
> block hosts which try to hit unauthorised ports (e.g. 31337, 139,
> etc).
>
> Hope that makes things clearer.
>
> Regards,
>
> -- Raju
>
>>>>>> "Varun" == Varun Varma <[EMAIL PROTECTED]> writes:
>
>    Varun> Hi!  Snort is a tool (http://www.snort.org) that provides
>    Varun> IDS functionality, pretty much like iplog. This seems a bit
>    Varun> fancier though - experimental built in route deletion
>    Varun> etc. Claim to fame - made to a Gartner Group Report on
>    Varun> IDSs', alongwith Cisco et. al. You can see the link to the
>    Varun> report somewhere near the bottom of the homepage.
>
>    Varun> Anyone tried it? How does it stack up againt iplog and/or
>    Varun> portsentry?
>
> --
> Raju Mathur          [EMAIL PROTECTED]
http://kandalaya.org/
>                     It is the mind that moves
>
>          ================================================
> To subscribe, send email to [EMAIL PROTECTED] with subscribe in
> subject header To unsubscribe, send email to [EMAIL PROTECTED]
> with unsubscribe in subject header Archives are available at
> http://www.mail-archive.com/ilugd%40wpaa.org
>          =================================================





          ================================================
To subscribe, send email to [EMAIL PROTECTED] with subscribe in
subject header
To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in
subject header
Archives are available at http://www.mail-archive.com/ilugd%40wpaa.org
          =================================================

          ================================================
To subscribe, send email to [EMAIL PROTECTED] with subscribe in subject header
To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject header
Archives are available at http://www.mail-archive.com/ilugd%40wpaa.org
          =================================================

Reply via email to