Ids
Ids
Detec6on Systems
Fengwei Zhang
• Problems
– “Zero-day” a^acks
– Polymorphic a^acks
• Problems
– High false posi6ve rates
– Labeled training data
ac6on protocol
Direc6on
ac6on protocol
Direc6on
1. alert: Alerts and logs the packet when triggered.
2. log: Only logs the packet when triggered.
3. pass : Ignores or drops the packet or traffic matching.
4. ac0vate : Alerts then ac6vates a dynamic rule or rules.
5. dynamic : Ignores, un6l started by the ac6vate rule, at which 6me, acts as a log rule.
6. drop : block and log the packet
7. reject : block the packet, log it, and then send a TCP reset if the protocol is TCP or an ICMP port
unreachable message if the protocol is UDP.
8. sdrop : block the packet but do not log it.
Wayne State University CSC Course: Cyber Security Prac6ce 14
Snort Rule Header Procotol
alert tcp $EXTERNAL_NET any -> $HOME_NET any
(msg:"SCAN SYN FIN";flags:SF; reference: arachnids,
198; classtype:a^empted-recon; sid:624; rev:1;)
ac6on protocol
Direc6on
Note: <- does not exist… so the snort rules always read
consistently.
name:value;