Snort is a
free
Free may refer to:
Concept
* Freedom, having the ability to do something, without having to obey anyone/anything
* Freethought, a position that beliefs should be formed only on the basis of logic, reason, and empiricism
* Emancipate, to procur ...
open source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by
Martin Roesch, founder and former CTO of
Sourcefire. Snort is now developed by
Cisco
Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develo ...
, which purchased Sourcefire in 2013.
In 2009, Snort entered
InfoWorld
''InfoWorld'' (abbreviated IW) is an information technology media business. Founded in 1978, it began as a monthly magazine. In 2007, it transitioned to a web-only publication. Its parent company today is International Data Group, and its sister ...
's Open Source Hall of Fame as one of the "greatest
ieces ofopen source software of all time".
Uses
Snort's open-source network-based
intrusion detection/prevention system (IDS/IPS) has the ability to perform real-time traffic analysis and
packet logging on
Internet Protocol
The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
...
(IP) networks. Snort performs protocol analysis, content searching and matching.
The program can also be used to detect probes or
attacks, including, but not limited to,
operating system fingerprinting attempts,
semantic URL attacks,
buffer overflow
In information security and programming, a buffer overflow, or buffer overrun, is an anomaly whereby a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.
Buffers are areas of memor ...
s,
server message block
Server Message Block (SMB) is a communication protocol originally developed in 1983 by Barry A. Feigenbaum at IBM and intended to provide shared access to files and printers across nodes on a network of systems running IBM's OS/2. It also provide ...
probes, and stealth
port scans.
Snort can be configured in three main modes: 1. sniffer, 2. packet logger, and 3. network intrusion detection.
Sniffer Mode
The program will read network packets and display them on the console.
Packet Logger Mode
In packet logger mode, the program will log packets to the disk.
Network Intrusion Detection System Mode
In intrusion detection mode, the program will monitor network traffic and analyze it against a rule set defined by the user. The program will then perform a specific action based on what has been identified.
Third-party tools
There are several third-party tools interfacing Snort for administration, reporting, performance and log analysis:
* Snorby – a
GPLv3
The GNU General Public License (GNU GPL or simply GPL) is a series of widely used free software licenses that guarantee end users the four freedoms to run, study, share, and modify the software. The license was the first copyleft for general u ...
Ruby on Rails application
* BASE
*
Sguil (free)
See also
*
List of free and open-source software packages
This is a list of free and open-source software packages, computer software licensed under free software licenses and open-source licenses. Software that fits the Free Software Definition may be more appropriately called free software; the GNU ...
*
Sigma
Sigma (; uppercase Σ, lowercase σ, lowercase in word-final position ς; grc-gre, σίγμα) is the eighteenth letter of the Greek alphabet. In the system of Greek numerals, it has a value of 200. In general mathematics, uppercase Σ is used ...
*
Suricata (software)
Suricata is an open-source based intrusion detection system (IDS) and intrusion prevention system (IPS). It was developed by the Open Information Security Foundation (OISF). A beta version was released in December 2009, with the first standard re ...
*
YARA Yara may refer to:
People
* YARA (girl group), a Filipino girl group
* Yara (given name)
* Yara (surname), a Japanese surname
* Yara (singer) (born 1983), Lebanese pop singer
* Yara (footballer) (born 1964), Brazilian footballer
Locations ...
*
Zeek
Zeek is a free and open-source software network analysis framework. Vern Paxson began development work on Zeek in 1995 at Lawrence Berkeley National Lab. Zeek is a network security monitor (NSM) but can also be used as a network intrusion detect ...
References
External links
*
Snort BlogTalos IntelligenceGrabify Alternatives to IP Logger
{{DEFAULTSORT:Snort (Software)
Free security software
Computer security software
Linux security software
Unix network-related software
Lua (programming language)-scriptable software
Intrusion detection systems