Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Snort Based IDS Config

Posted on 2014-01-20
1
Medium Priority
?
412 Views
Last Modified: 2014-01-21
I'm looking for tutorial to teach step-by-step, how to configure a snort based NIDS. A video would most helpful but any book will do as well.
0
Comment
Question by:SydNal2009
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 39796827
Better means is to get hand dirty and hopefully it get some kickstart. I believe the other experienced experts in snort can share more tips and experience too...the tough part is not the setup or installation but to really get it fit for your deployment needs and environment right at first will not be a bed of roses....Security onion is definitely a good start to learn it

snort official
(know it as fundamental though hardest to ingest at first. but it is reference not to neglect and fallback) http://www.snort.org/docs
(join in the community as learning curve to shorten - ask question. there is webcast to help bridge knowledge and know how sharing)
http://www.snort.org/community
http://www.snort.org/community/snort-webcast-series/

Tutorial  (rather old but still stands)
http://openmaniak.com/snort_tutorial_snort.php
http://www.thegeekstuff.com/2010/08/snort-tutorial/

On Security Onion
(the screenshot walkthrough is useful)
http://ptcoresec.eu/2013/02/14/tutorial-how-to-install-and-use-security-onion-pt-1/

Videos
(Irongeek.com has a ton of videos and security how to)
http://www.irongeek.com/i.php?page=videos/basic-setup-of-security-onion-snort-snorby-barnyard-pulledpork-daemonlogger
(This is quick snapshot but good to give you a flavour)
http://searchsecurity.techtarget.com/video/Security-Onion-tutorial-Analyze-network-traffic-using-Security-Onion
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question