Preface | p. vii |
Installation and Optimization | p. 1 |
Installing Snort from Source on Unix | p. 1 |
Installing Snort Binaries on Linux | p. 4 |
Installing Snort on Solaris | p. 5 |
Installing Snort on Windows | p. 7 |
Uninstalling Snort from Windows | p. 12 |
Installing Snort on Mac OS X | p. 14 |
Uninstalling Snort from Linux | p. 16 |
Upgrading Snort on Linux | p. 17 |
Monitoring Multiple Network Interfaces | p. 17 |
Invisibly Tapping a Hub | p. 19 |
Invisibly Sniffing Between Two Network Points | p. 19 |
Invisibly Sniffing 100 MB Ethernet | p. 21 |
Sniffing Gigabit Ethernet | p. 22 |
Tapping a Wireless Network | p. 23 |
Positioning Your IDS Sensors | p. 24 |
Capturing and Viewing Packets | p. 27 |
Logging Packets That Snort Captures | p. 30 |
Running Snort to Detect Intrusions | p. 33 |
Reading a Saved Capture File | p. 35 |
Running Snort as a Linux Daemon | p. 36 |
Running Snort as a Windows Service | p. 37 |
Capturing Without Putting the Interface into Promiscuous Mode | p. 39 |
Reloading Snort Settings | p. 39 |
Debugging Snort Rules | p. 40 |
Building a Distributed IDS (Plain Text) | p. 41 |
Building a Distributed IDS (Encrypted) | p. 44 |
Logging, Alerts, and Output Plug-ins | p. 51 |
Logging to a File Quickly | p. 51 |
Logging Only Alerts | p. 52 |
Logging to a CSV File | p. 54 |
Logging to a Specific File | p. 56 |
Logging to Multiple Locations | p. 56 |
Logging in Binary | p. 58 |
Viewing Traffic While Logging | p. 60 |
Logging Application Data | p. 61 |
Logging to the Windows Event Viewer | p. 63 |
Logging Alerts to a Database | p. 64 |
Installing and Configuring MySQL | p. 65 |
Configuring MySQL for Snort | p. 67 |
Using PostgreSQL with Snort and ACID | p. 70 |
Logging in PCAP Format (TCPDump) | p. 74 |
Logging to Email | p. 75 |
Logging to a Pager or Cell Phone | p. 77 |
Optimizing Logging | p. 78 |
Reading Unified Logged Data | p. 80 |
Generating Real-Time Alerts | p. 81 |
Ignoring Some Alerts | p. 82 |
Logging to System Logfiles | p. 82 |
Fast Logging | p. 83 |
Logging to a Unix Socket | p. 84 |
Not Logging | p. 86 |
Prioritizing Alerts | p. 87 |
Capturing Traffic from a Specific TCP Session | p. 88 |
Killing a Specific Session | p. 89 |
Rules and Signatures | p. 90 |
How to Build Rules | p. 90 |
Keeping the Rules Up to Date | p. 94 |
Basic Rules You Shouldn't Leave Home Without | p. 98 |
Dynamic Rules | p. 100 |
Detecting Binary Content | p. 102 |
Detecting Malware | p. 103 |
Detecting Viruses | p. 104 |
Detecting IM | p. 105 |
Detecting P2P | p. 107 |
Detecting IDS Evasion | p. 110 |
Countermeasures from Rules | p. 114 |
Testing Rules | p. 115 |
Optimizing Rules | p. 116 |
Blocking Attacks in Real Time | p. 117 |
Suppressing Rules | p. 118 |
Thresholding Alerts | p. 118 |
Excluding from Logging | p. 119 |
Carrying Out Statistical Analysis | p. 120 |
Preprocessing: An Introduction | p. 125 |
Detecting Stateless Attacks and Stream Reassembly | p. 126 |
Detecting Fragmentation Attacks and Fragment Reassembly with Frag2 | p. 131 |
Detecting and Normalizing HTTP Traffic | p. 136 |
Decoding Application Traffic | p. 141 |
Detecting Port Scans and Talkative Hosts | p. 142 |
Getting Performance Metrics | p. 149 |
Experimental Preprocessors | p. 155 |
Writing Your Own Preprocessor | p. 156 |
Administrative Tools | p. 157 |
Managing Snort Sensors | p. 157 |
Installing and Configuring IDScenter | p. 159 |
Installing and Configuring SnortCenter | p. 167 |
Installing and Configuring Snortsnarf | p. 173 |
Running Snortsnarf Automatically | p. 175 |
Installing and Configuring ACID | p. 175 |
Securing ACID | p. 180 |
Installing and Configuring Swatch | p. 181 |
Installing and Configuring Barnyard | p. 183 |
Administering Snort with IDS Policy Manager | p. 184 |
Integrating Snort with Webmin | p. 190 |
Administering Snort with HenWen | p. 196 |
Newbies Playing with Snort Using EagleX | p. 201 |
Log Analysis | p. 203 |
Generating Statistical Output from Snort Logs | p. 203 |
Generating Statistical Output from Snort Databases | p. 207 |
Performing Real-Time Data Analysis | p. 208 |
Generating Text-Based Log Analysis | p. 212 |
Creating HTML Log Analysis Output | p. 214 |
Tools for Testing Signatures | p. 215 |
Analyzing and Graphing Logs | p. 220 |
Analyzing Sniffed (Pcap) Traffic | p. 223 |
Writing Output Plug-ins | p. 224 |
Miscellaneous Other Uses | p. 225 |
Monitoring Network Performance | p. 225 |
Logging Application Traffic | p. 233 |
Recognizing HTTP Traffic on Unusual Ports | p. 234 |
Creating a Reactive IDS | p. 235 |
Monitoring a Network Using Policy-Based IDS | p. 238 |
Port Knocking | p. 240 |
Obfuscating IP Addresses | p. 243 |
Passive OS Fingerprinting | p. 244 |
Working with Honeypots and Honeynets | p. 250 |
Performing Forensics Using Snort | p. 252 |
Snort and Investigations | p. 253 |
Snort as Legal Evidence in the U.S. | p. 257 |
Snort as Evidence in the U.K. | p. 258 |
Snort as a Virus Detection Tool | p. 260 |
Staying Legal | p. 263 |
Index | p. 265 |
Table of Contents provided by Ingram. All Rights Reserved. |