Differences between revisions 1 and 3 (spanning 2 versions)
Revision 1 as of 2001-12-14 12:46:45
Size: 1381
Editor: pw
Comment:
Revision 3 as of 2002-02-21 09:02:39
Size: 1403
Editor: user-uini6mf
Comment:
Deletions are marked like this. Additions are marked like this.
Line 3: Line 3:
See also: ActivePortal See also: ActivePortal, SoftSecurity
Line 18: Line 18:
[CategoryHowto] [CategoryDocumentation]

Extrusion detection (aka. reverse intrusion detection) is the process of turning an intrusion detection system on it's head so that it watches for "bad" traffic leaving your network instead of bad traffic entering your network.

See also: ActivePortal, SoftSecurity

Below is a brief how to posted by TerrySchmidt on how he setup up an ExtrusionDetection system on his node:

  1. Grab the latest version of Snort (www.snort.org) currently it is 1.8p1 (however I'm running 1.7)
  2. Grab the latest ruleset from www.snort.org (there are other snort rulesets available, I haven't determined which one best suites this projects needs).
  3. Whittle down the ruleset to just rules that only create True Positives (Not down to an exact since)
  4. Reverse the rules (done in just one place in the Snort configuration file) so that you monitor all traffic coming from your suspected hosts (probably wireless clients) against all the internet hosts.
  5. Set the parameters high enough so you don't get accidental portscan false positives.
  6. Test the setup and monitor the rules for false positives.
  7. After you are satisfied, add Guardian (www.snort.org) which starts blocking IP addresses using IP chains of people triggering alerts. Be careful with the Guardian as you can block legitament hosts, and even yourself if configured improperly.

(Added by AdamShand)


[CategoryDocumentation]

ExtrusionDetection (last edited 2012-04-18 20:45:59 by DanRasmussen)