Signature Based Network Intrusion Detection System Using Snort and Winpcap IJERTV1IS10299
Signature Based Network Intrusion Detection System Using Snort and Winpcap IJERTV1IS10299
ISSN: 2278-0181
Vol. 1 Issue 10, December- 2012
Abstract- Nowadays, organizations discover detection system’s main role in a network is to help
that it is essential to protect their valuable computer systems to prepare and deal with the
information and internal resources from network attacks.
unauthorized access like deploying firewall. As
the use of internet is growing rapidly the Intrusion detection functions include [2]:
possibility of attack is also increasing in that
ratio. Signature is the pattern that you look for Analysis of abnormal activity patterns
inside a data packet. Signatures may be present Analyzing system configurations and
in different parts of a data packet depending vulnerabilities
upon the nature of the attack. Intrusion Ability to recognize patterns typical of
detection system’s main role in a network is to attacks
help computer systems to prepare and deal with Monitoring and analyzing both user and
the network attacks. Intrusion detection systems system activities
(IDS) have become a key component in ensuring Assessing system and file integrity
RRTT
the safety of systems and networks. These
systems enforce a security policy by inspecting Intrusion Detection Systems (IDS) inspect arriving
arriving packets for known signatures packets for malicious content (signatures) as
IIJJEE
(patterns). Snort is mostly used signature based defined by a security policy. Unfortunately,
IDS because of it is Lightweight and open source comparing packet headers and payloads against a
software. Basic analysis and security engine policy can be complex and time-consuming. For
(BASE) is also used to see the alerts generated example, it has been found that content matching
by Snort. In this paper we have implemented the (scanning for signatures) accounts for more than
signature-based Network intrusion detection 70% of the packet processing time [3],[4].
using Snort and WinPcap.
This paper focuses on analyzing the abnormal
-
Keywords Network Intrusion Detection System, activity that has been detected by our Intrusion
Snort, Signature-based, WinPcap, BASE Detection System using Snort and WinPcap. Snort
is a popular NIDS that is used to audit network
packets and compare those packets with the
database of known attack signature and this attack
I. INTRODUCTION signature database must be updated time by time.
www.ijert.org 1
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 10, December- 2012
Signature based detection system (also called Snort is basically the combination of multiple
misuse based), this type of detection is very components. All the component work together to
effective against known attacks [5]. It implies that find a particular attack and then take the
misuse detection requires specific knowledge of corresponding action that is required for that
given intrusive behaviour. An example of Signature particular attack. Basically it consists of following
based Intrusion Detection System is SNORT. major components as shown in figure 1 [7]:
Disadvantages [6]:
www.ijert.org 2
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 10, December- 2012
All IDS rules have two logical parts: rule header The protocol part is used to apply the rule on
and rule option [8]. This is shown in Figure 2. packets for a particular protocol only. This is the
first criterion mentioned in the rule. Some
examples of protocols used are IP, ICMP, UDP and
etc.
Figure 2: Basic Structure of IDS Rules
The address part define source and destination
The rule header contains information about what address. Address may be a single host, multiple
action a rule takes. It also contains criteria for host or network address. The researcher can also
matching a rule against data packets. The options use these parts to exclude some address from a
www.ijert.org 3
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 10, December- 2012
complete network. Source and destination address the originator of the connection
are determined based on direction field. As an
example, if the direction field is “->”, the address
on the left side is source and the address at the Msg “…” : this message is printed to the
right side is destination. snort.alert log file.
In case of TCP or UDP protocol, the port parts Flags : SYN and ACK flags are set.
determine the source and destination ports of a Other flags such as PSH, FIN,
packet on which the rule is applied. In case of RST, and URG could also be
network layer protocols like IP and ICMP, port specified as part of a signature.
numbers have no significance.
V. Snort NIDS Topology
The direction part of the rule actually determines
which address and port number is used as source From the figures referred from [7] given below
and which as destination. Snort utilizes a pattern concept of signature based IDS can easily
matching model for detection of network attack understand. It is clear that when any person sends
signatures using identifiers such as TCP fields, IP data inside the network so first of all it goes to
addresses, TCP/UDP port numbers, ICMP Default gateway and check rule and if found
type/code, and strings contained in the packet malicious then it discards the packet otherwise send
payload. For example, Snort may have a rule such to destination system.
as the following:
www.ijert.org 4
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 10, December- 2012
then IDS system discard the packet otherwise it BASE is a web interface to perform analysis of
sends the packet to destination system. intrusions that snort has detected on the network.
This application provides a web front-end to query
VI. TOOLS USED IN SIGNATURE- and analyze the alerts coming from a SNORT IDS
BASED NIDS SYSTEM system. It uses a user authentication and role-base
system; so that you as the security admin can
decide what and how much information each user
To implement signature-based network Intrusion can see. It also has a simple to use, web-based
detection System; we need to install some tools, setup program for people not comfortable with
such as Snort, BASE and WinPcap. editing files directly [12].
Snort [9]
WinPcap
www.ijert.org 5
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 10, December- 2012
REFERENCES
[1] D. E. Denning. “An Intrusion-Detection
Model”. IEEE transactions on software
engineering, Volume : 13 Issue: 2,
February 1987.
VIII. CONCLUSION AND FUTURE WORK [6] Guan Xin and Li Yun-jie, “A new
Intrusion Prevention Attack System Model
IIJJEE
www.ijert.org 6
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 10, December- 2012
AUTHOR’S PROFILE
www.ijert.org 7