To access material, start machines and answer questions login.
As we know, firewalls are the security solution usually deployed on the boundary of a network to protect its incoming and outgoing traffic. The checks the traffic when a connection is going to take place and denies it if it violates the rules. However, there should be some security to detect the activities of the connection that passed through the and has already taken place. So, if an attacker successfully bypasses a via a legitimate-looking connection and then performs any malicious activities inside the network, there should be something to detect it in a timely manner. For this purpose, we have a security solution inside the network. This solution is known as an Intrusion Detection System (IDS).
Think of an example of a building’s security. A acts as the gatekeeper, checking the people coming in and going out. There is always a chance that some bad actor will successfully sneak inside and start performing malicious activities. He was missed at the gate, but what if we catch him even after he gets in? This can be done by the surveillance cameras present throughout the building. The plays the role of surveillance cameras. It sits in a corner, monitors the network traffic based on its signature and anomaly-based detections, and detects any abnormal traffic going out or inside the network. Upon every detection, an alert is generated for the security administrators. does not act on those detections; it only notifies the security administrators about the malicious activity.
This room will equip you with sound knowledge of solutions. We will also explore the most popular open-source solution in the upcoming tasks.
Learning Objectives
- Types of and their detection capabilities
- Working of Snort
- Default and custom rules in Snort
- Making a custom rule in Snort
Prerequisites
This room expects the users to have completed or explored the following rooms:
Can an intrusion detection system (IDS) prevent the threat after it detects it? Yea/Nay
Ready to learn Cyber Security?
The IDS Fundamentals room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
