Solved

Snort Based IDS Config

Posted on 2014-01-20
1
389 Views
Last Modified: 2014-01-21
I'm looking for tutorial to teach step-by-step, how to configure a snort based NIDS. A video would most helpful but any book will do as well.
0
Comment
Question by:SydNal2009
1 Comment
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 39796827
Better means is to get hand dirty and hopefully it get some kickstart. I believe the other experienced experts in snort can share more tips and experience too...the tough part is not the setup or installation but to really get it fit for your deployment needs and environment right at first will not be a bed of roses....Security onion is definitely a good start to learn it

snort official
(know it as fundamental though hardest to ingest at first. but it is reference not to neglect and fallback) http://www.snort.org/docs
(join in the community as learning curve to shorten - ask question. there is webcast to help bridge knowledge and know how sharing)
http://www.snort.org/community
http://www.snort.org/community/snort-webcast-series/

Tutorial  (rather old but still stands)
http://openmaniak.com/snort_tutorial_snort.php
http://www.thegeekstuff.com/2010/08/snort-tutorial/

On Security Onion
(the screenshot walkthrough is useful)
http://ptcoresec.eu/2013/02/14/tutorial-how-to-install-and-use-security-onion-pt-1/

Videos
(Irongeek.com has a ton of videos and security how to)
http://www.irongeek.com/i.php?page=videos/basic-setup-of-security-onion-snort-snorby-barnyard-pulledpork-daemonlogger
(This is quick snapshot but good to give you a flavour)
http://searchsecurity.techtarget.com/video/Security-Onion-tutorial-Analyze-network-traffic-using-Security-Onion
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There is a question posted at http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/Windows_Server_2008/Q_28324159.html (http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/Windows_Server_2008/Q_28324159.html) and i…
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now