- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Snort Cookbook Paperback – Apr 8 2005
|New from||Used from|
Special Offers and Product Promotions
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
About the Author
Angela Orebaugh is an information security technologist, scientist, and author with a broad spectrum of expertise in information assurance. She synergizes her 15 years of hands-on experiences within industry, academia, and government to advise clients on information assurance strategy, management, and technologies.
Ms. Orebaugh is involved in several security initiatives with the National Institute of Standards and Technology (NIST), including technical Special Publications (800 series), the National Vulnerability Database (NVD), Security Content Automation Protocol (SCAP) project, and secure eVoting.
Ms. Orebaugh is an Adjunct Professor for George Mason University where she performs research and teaching in intrusion detection and forensics. She developed and teaches the Intrusion Detection curriculum, a core requirement for the Forensics program in the Department of Electrical and Computer Engineering. Her current research interests include peer-reviewed publications in the areas of intrusion detection and prevention, data mining, attacker profiling, user behavior analysis, and network forensics.
Ms. Orebaugh is the author of the Syngress best seller's Nmap in the Enterprise, Wireshark and Ethereal Network Protocol Analyzer Toolkit, and Ethereal Packet Sniffing. She has also co-authored the Snort Cookbook, Intrusion Prevention and Active Response, and How to Cheat at Configuring Open Source Security Tools. Angela is a frequent speaker at a variety of security conferences and technology events, including the SANS Institute and The Institute for Applied Network Security.
Ms. Orebaugh holds a Masters degree in Computer Science and a Bachelors degree in Computer Information Systems from James Madison University. She is currently completing her dissertation for her Ph.D. at George Mason University, with a concentration in Information Security.
Simon Biles is currently Director of Thinking Security Ltd. an Information Security Consultancy based near Oxford in the UK. The company deals with all aspects of InfoSec from Incident Response and Forensics through to ISO 27001 work. He is currently studying for his MSc in Forensic Computing at Shrivenham with Cranfield University. He holds a CISSP, is Certified as an ISO17799 Lead Auditor, is a Chartered IT Professional with the British Computer Society and is also a member of F3 - the UK's First Forensic Forum. Currently he is involved in a project to define and support best practices in Forensics - you can find out more about this at the Open Forensics Group.
Jake Babbin works as a contractor with a government agency filling the role of Intrusion Detection Team Lead. He has worked in both private industry as a security professional and in government space in a variety of IT security roles. He is a speaker at several IT security conferences and is a frequent assistant in SANS Security Essentials Bootcamp, Incident Handling and Forensics courses. Jake lives in Virginia.
Inside This Book(Learn More)
Most Helpful Customer Reviews on Amazon.com (beta)
The Snort Cookbook starts poorly with ch 1, which at 50 pages is the book's largest. After repeating installation instructions covered in online resources, the book turns to dubious packet collection recommendations. Item 1.10 suggests creating a listen-only Ethernet cable but never mentions disabling ARP traffic with ifconfig's -arp option. Item 1.11 describes how to build a homebrew tap but doesn't address signal regeneration problems that could result in traffic loss.
Item 1.12 gives terrible advice: "If your Snort machine has only one network interface, using the passive tap, run both lines to a small hub. Then from another port of the hub, run a cable to your IDS. This will combine and maybe even buffer the traffic for the IDS and give a full duplex connection." Wrong -- this is a nice way to never see traffic when full-duplex packets from the two transmit lines collide in the hub.
Item 1.14 says "Snort itself is incapable of sniffing a wireless network," but it ignores the fact that while Snort doesn't understand 802.11 traffic, the sensor can join a wireless network and interpret what it sees. Item 1.15 demonstrates more ignorance of hardware issues by saying "Linux-compatible gigabit Ethernet cards are available with up to six ports. Coupled with machines that have space for three or four PCI cards, you could have as many as 24 Ethernet ports." This suggestion completely ignores the fact that a single gigabit NIC will saturate a 32 bit, 33 MHz PCI bus, and many BIOS will not be able to handle interrupts from more than about 8 NICs in a PC.
Item 1.25 says "two to four million records is the max for MySQL," which is odd. One MySQL database I use to collect session data on Sguil has over 31 million records. Item 1.25 also covers the often-repeated and incredibly naive method of having Snort log directly to a database, without utilizing Barnyard as an intermediary. Thankfully we see Barnyard covered in ch 2, but recommended for "high-speed network[s], such as 1 Gbps or greater." Barnyard is definitely appropriate when monitoring at less than gigabit speeds.
Throughout the book, the obsolete ACID Web-based alert console appears. BASE has been available since October 2004; it addresses stale code problems in ACID and should have been covered. I was disappointed to see the Sguil suite mentioned but never given any discussion, even though the older Snort 2.1 book introduces using Sguil. Item 4.2 mentions "RST scans" even though they are a fiction of one security researcher's imagination. Item 6.6 claims to offer ways to test Snort by showing three programs (Snot, Sneeze, Stick) that have had little effect on modern Snort implementations (e.g., 2001 on).
On the positive side, in many cases the Snort Cookbook properly addresses questions which frequently appear on the snort-users mailing list. Items 2.15 and 2.16 show how to send Snort alerts to email, a pager, or cell phone using Syslog and Swatch. Item 3.2 discusses rule updates with Oinkmaster. Rule issues in ch 3 were generally helpful, like dynamic rules (3.4), evasion issues (3.10), optimization (3.13), and even Spade (3.18). Perfmon coverage in items 4.6 and 7.0 help discover how well Snort is working. I also liked the policy-based IDS ideas in item 7.5.
The back cover of the Snort Cookbook says the book "can save you countless hours of sifting through dubious online advice or wordy tutorials." That online advice is frequently more correct than what appears in this book. While some of the book is helpful, often that material has already been introduced in online documentation or best covered in Syngress' Snort 2.1. Perhaps a second edition will address the concerns in this review and produce a more useful cookbook for future readers.
Of course and inevitably, the default rules base has grown and it is regularly updated. Currently, these defaults number some 3000, and few sysadmins have the expertise to understand all of them. So one recipe tells you how to get and run an updater program (Oinkmaster). Though you are cautioned about letting it change your rules automatically.
Other recipes expand upon the rule scope in interesting ways, like looking for p2p or Instant Messaging traffic. You might be responsible for a corporate network that bans these, perhaps. Here is a simple way to show a supervisor how you can stay on top of the problem.
by: Orebaugh, Biles & Babbin
What can I say designing a reliable detection system is a challenge at best.
This book makes it seem easy! I thought this was the best layout of a tech.book I have ever saw.
Problem > Solution > Discussion. they gave you the information in a precise way with out overloading you
with material you did not need. The Rules section was espcially useful...
The only downside is I wanted to see more on rules with samples.
Overall this was a very useful Book. I already had snort in place this made it much more useful.
As there is plenty of material at [...] and as getting Snort running isn't all that complicated anyway, that's not a major flaw.
Like another reviewer here, I think the rules sections are probably the best part of the book, though I was also impressed by the attention given to the specifics of Windows and Mac OS X - it's nice to see that level of completeness.
Anyway, Snort is another tool in stopping the bad guys from coming into your system. In particular it is an intrusion detector. Note the word detector. Snort monitors your system to see what's happening. It is not an anti-virus like program that detects, quarantines, deletes, etc. an infected file. Instead it watches what is going on in the system and looks for behavior that is outside the rules.
Snort watches, records and reports on what the systems in you network might be doing. On a big network, running Snort could well be a full time job. It can produce volumes of information. Some of this information regarding your employees might be considered spying on them, there are also some words (a few more wouldn't hurt) on what you can do to outsiders vs. your own people.
Look for similar items by category
- Books > Business & Investing > Industries & Professions > E-commerce
- Books > Computers & Technology > Hardware > Internet & Networking
- Books > Computers & Technology > History & Culture > Privacy
- Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
- Books > Computers & Technology > Networking & Cloud Computing > Intranets & Extranets
- Books > Computers & Technology > Networking & Cloud Computing > Network Administration
- Books > Computers & Technology > Networking & Cloud Computing > Network Programming
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > LAN
- Books > Computers & Technology > Operating Systems > Unix
- Books > Computers & Technology > Programming
- Books > Computers & Technology > Security & Encryption
- Books > Computers & Technology > Software > E-mail
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Textbooks > Computer Science & Information Systems > Networking
- Books > Textbooks > Computer Science & Information Systems > Operating Systems
- Books > Textbooks > Computer Science & Information Systems > Programming Languages