Solved

Snort Based IDS Config

Posted on 2014-01-20
1
390 Views
Last Modified: 2014-01-21
I'm looking for tutorial to teach step-by-step, how to configure a snort based NIDS. A video would most helpful but any book will do as well.
0
Comment
Question by:SydNal2009
1 Comment
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 39796827
Better means is to get hand dirty and hopefully it get some kickstart. I believe the other experienced experts in snort can share more tips and experience too...the tough part is not the setup or installation but to really get it fit for your deployment needs and environment right at first will not be a bed of roses....Security onion is definitely a good start to learn it

snort official
(know it as fundamental though hardest to ingest at first. but it is reference not to neglect and fallback) http://www.snort.org/docs
(join in the community as learning curve to shorten - ask question. there is webcast to help bridge knowledge and know how sharing)
http://www.snort.org/community
http://www.snort.org/community/snort-webcast-series/

Tutorial  (rather old but still stands)
http://openmaniak.com/snort_tutorial_snort.php
http://www.thegeekstuff.com/2010/08/snort-tutorial/

On Security Onion
(the screenshot walkthrough is useful)
http://ptcoresec.eu/2013/02/14/tutorial-how-to-install-and-use-security-onion-pt-1/

Videos
(Irongeek.com has a ton of videos and security how to)
http://www.irongeek.com/i.php?page=videos/basic-setup-of-security-onion-snort-snorby-barnyard-pulledpork-daemonlogger
(This is quick snapshot but good to give you a flavour)
http://searchsecurity.techtarget.com/video/Security-Onion-tutorial-Analyze-network-traffic-using-Security-Onion
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Different types of mobile security tests 3 108
Cisco ACS re-imaging with CIMC 2 65
RNC Hacking Question 6 42
non-domain members are not prompted for credentials 18 43
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question