Snort Cookbook

( 1 )


If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential—but often overwhelming—challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet ...

See more details below
Other sellers (Paperback)
  • All (14) from $11.61   
  • New (7) from $22.14   
  • Used (7) from $11.61   
Snort Cookbook

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$17.99 price
(Save 43%)$31.99 List Price


If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential—but often overwhelming—challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as:

  • installation
  • optimization
  • logging
  • alerting
  • rules and signatures
  • detecting viruses
  • countermeasures
  • detecting common attacks
  • administration
  • honeypots
  • log analysis
But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches—and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice—will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus—and still have a life.
Read More Show Less

Product Details

  • ISBN-13: 9780596007911
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 4/28/2005
  • Edition number: 1
  • Pages: 288
  • Sales rank: 1,007,724
  • Product dimensions: 6.86 (w) x 9.38 (h) x 0.69 (d)

Meet the Author

Angela Orebaugh is an information security technologist, scientist, and author with a broad spectrum of expertise in information assurance. She synergizes her 15 years of hands-on experiences within industry, academia, and government to advise clients on information assurance strategy, management, and technologies.

Ms. Orebaugh is involved in several security initiatives with the National Institute of Standards and Technology (NIST), including technical Special Publications (800 series), the National Vulnerability Database (NVD), Security Content Automation Protocol (SCAP) project, and secure eVoting.

Ms. Orebaugh is an Adjunct Professor for George Mason University where she performs research and teaching in intrusion detection and forensics. She developed and teaches the Intrusion Detection curriculum, a core requirement for the Forensics program in the Department of Electrical and Computer Engineering. Her current research interests include peer-reviewed publications in the areas of intrusion detection and prevention, data mining, attacker profiling, user behavior analysis, and network forensics.

Ms. Orebaugh is the author of the Syngress best seller's Nmap in the Enterprise, Wireshark and Ethereal Network Protocol Analyzer Toolkit, and Ethereal Packet Sniffing. She has also co-authored the Snort Cookbook, Intrusion Prevention and Active Response, and How to Cheat at Configuring Open Source Security Tools. Angela is a frequent speaker at a variety of security conferences and technology events, including the SANS Institute and The Institute for Applied Network Security.

Ms. Orebaugh holds a Masters degree in Computer Science and a Bachelors degree in Computer Information Systems from James Madison University. She is currently completing her dissertation for her Ph.D. at George Mason University, with a concentration in Information Security.

Simon Biles is currently Director of Thinking Security Ltd. an Information Security Consultancy based near Oxford in the UK. The company deals with all aspects of InfoSec from Incident Response and Forensics through to ISO 27001 work. He is currently studying for his MSc in Forensic Computing at Shrivenham with Cranfield University. He holds a CISSP, is Certified as an ISO17799 Lead Auditor, is a Chartered IT Professional with the British Computer Society and is also a member of F3 - the UK's First Forensic Forum. Currently he is involved in a project to define and support best practices in Forensics - you can find out more about this at the Open Forensics Group.

Jake Babbin works as a contractor with a government agency filling the role of Intrusion Detection Team Lead. He has worked in both private industry as a security professional and in government space in a variety of IT security roles. He is a speaker at several IT security conferences and is a frequent assistant in SANS Security Essentials Bootcamp, Incident Handling and Forensics courses. Jake lives in Virginia.

Read More Show Less

Table of Contents

Contents of This Book;
Conventions Used in This Book;
Using Code Examples;
Safari Enabled;
How to Contact Us;
Chapter 1: Installation and Optimization;
1.1 Introduction;
1.1 Installing Snort from Source on Unix;
1.2 Installing Snort Binaries on Linux;
1.3 Installing Snort on Solaris;
1.4 Installing Snort on Windows;
1.5 Uninstalling Snort from Windows;
1.6 Installing Snort on Mac OS X;
1.7 Uninstalling Snort from Linux;
1.8 Upgrading Snort on Linux;
1.9 Monitoring Multiple Network Interfaces;
1.10 Invisibly Tapping a Hub;
1.11 Invisibly Sniffing Between Two Network Points;
1.12 Invisibly Sniffing 100 MB Ethernet;
1.13 Sniffing Gigabit Ethernet;
1.14 Tapping a Wireless Network;
1.15 Positioning Your IDS Sensors;
1.16 Capturing and Viewing Packets;
1.17 Logging Packets That Snort Captures;
1.18 Running Snort to Detect Intrusions;
1.19 Reading a Saved Capture File;
1.20 Running Snort as a Linux Daemon;
1.21 Running Snort as a Windows Service;
1.22 Capturing Without Putting the Interface into Promiscuous Mode;
1.23 Reloading Snort Settings;
1.24 Debugging Snort Rules;
1.25 Building a Distributed IDS (Plain Text);
1.26 Building a Distributed IDS (Encrypted);
Chapter 2: Logging, Alerts, and Output Plug-ins;
2.1 Introduction;
2.1 Logging to a File Quickly;
2.2 Logging Only Alerts;
2.3 Logging to a CSV File;
2.4 Logging to a Specific File;
2.5 Logging to Multiple Locations;
2.6 Logging in Binary;
2.7 Viewing Traffic While Logging;
2.8 Logging Application Data;
2.9 Logging to the Windows Event Viewer;
2.10 Logging Alerts to a Database;
2.11 Installing and Configuring MySQL;
2.12 Configuring MySQL for Snort;
2.13 Using PostgreSQL with Snort and ACID;
2.14 Logging in PCAP Format (TCPDump);
2.15 Logging to Email;
2.16 Logging to a Pager or Cell Phone;
2.17 Optimizing Logging;
2.18 Reading Unified Logged Data;
2.19 Generating Real-Time Alerts;
2.20 Ignoring Some Alerts;
2.21 Logging to System Logfiles;
2.22 Fast Logging;
2.23 Logging to a Unix Socket;
2.24 Not Logging;
2.25 Prioritizing Alerts;
2.26 Capturing Traffic from a Specific TCP Session;
2.27 Killing a Specific Session;
Chapter 3: Rules and Signatures;
3.1 Introduction;
3.1 How to Build Rules;
3.2 Keeping the Rules Up to Date;
3.3 Basic Rules You Shouldn't Leave Home Without;
3.4 Dynamic Rules;
3.5 Detecting Binary Content;
3.6 Detecting Malware;
3.7 Detecting Viruses;
3.8 Detecting IM;
3.9 Detecting P2P;
3.10 Detecting IDS Evasion;
3.11 Countermeasures from Rules;
3.12 Testing Rules;
3.13 Optimizing Rules;
3.14 Blocking Attacks in Real Time;
3.15 Suppressing Rules;
3.16 Thresholding Alerts;
3.17 Excluding from Logging;
3.18 Carrying Out Statistical Analysis;
Chapter 4: Preprocessing: An Introduction;
4.1 Introduction;
4.1 Detecting Stateless Attacks and Stream Reassembly;
4.2 Detecting Fragmentation Attacks and Fragment Reassembly with Frag2;
4.3 Detecting and Normalizing HTTP Traffic;
4.4 Decoding Application Traffic;
4.5 Detecting Port Scans and Talkative Hosts;
4.6 Getting Performance Metrics;
4.7 Experimental Preprocessors;
4.8 Writing Your Own Preprocessor;
Chapter 5: Administrative Tools;
5.1 Introduction;
5.1 Managing Snort Sensors;
5.2 Installing and Configuring IDScenter;
5.3 Installing and Configuring SnortCenter;
5.4 Installing and Configuring Snortsnarf;
5.5 Running Snortsnarf Automatically;
5.6 Installing and Configuring ACID;
5.7 Securing ACID;
5.8 Installing and Configuring Swatch;
5.9 Installing and Configuring Barnyard;
5.10 Administering Snort with IDS Policy Manager;
5.11 Integrating Snort with Webmin;
5.12 Administering Snort with HenWen;
5.13 Newbies Playing with Snort Using EagleX;
Chapter 6: Log Analysis;
6.1 Introduction;
6.1 Generating Statistical Output from Snort Logs;
6.2 Generating Statistical Output from Snort Databases;
6.3 Performing Real-Time Data Analysis;
6.4 Generating Text-Based Log Analysis;
6.5 Creating HTML Log Analysis Output;
6.6 Tools for Testing Signatures;
6.7 Analyzing and Graphing Logs;
6.8 Analyzing Sniffed (Pcap) Traffic;
6.9 Writing Output Plug-ins;
Chapter 7: Miscellaneous Other Uses;
7.1 Introduction;
7.1 Monitoring Network Performance;
7.2 Logging Application Traffic;
7.3 Recognizing HTTP Traffic on Unusual Ports;
7.4 Creating a Reactive IDS;
7.5 Monitoring a Network Using Policy-Based IDS;
7.6 Port Knocking;
7.7 Obfuscating IP Addresses;
7.8 Passive OS Fingerprinting;
7.9 Working with Honeypots and Honeynets;
7.10 Performing Forensics Using Snort;
7.11 Snort and Investigations;
7.12 Snort as Legal Evidence in the U.S.;
7.13 Snort as Evidence in the U.K.;
7.14 Snort as a Virus Detection Tool;
7.15 Staying Legal;

Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted April 24, 2005

    rules are the core of Snort

    The core of this book is the chapter on Rules and Signatures. Snort is renowned for its rule language and its vast flexibility. It is a reasonably high level 'script' that seems more declarative than procedural. Ok, I'm speaking a little figuratively, but if you scan the rules, you might see what I mean. The chapter explains how to build rules of varying levels of complexity, depending on your needs. One neat trait is the profuse range of options for detecting traffic around the machine running Snort. Of course and inevitably, the default rules base has grown and it is regularly updated. Currently, these defaults number some 3000, and few sysadmins have the expertise to understand all of them. So one recipe tells you how to get and run an updater program (Oinkmaster). Though you are cautioned about letting it change your rules automatically. Other recipes expand upon the rule scope in interesting ways, like looking for p2p or Instant Messaging traffic. You might be responsible for a corporate network that bans these, perhaps. Here is a simple way to show a supervisor how you can stay on top of the problem.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)