Questions tagged [intrusion-detection]

137 questions
0
votes
3 answers

NGINX logs in WAZUH

I am using NGINX in my setup, and wazuh for IDS. I want to check all nginx logs (access/error) logs in wazuh kibana, but I am unable to do so. All the logs are forwarded to " /var/ossec/logs/archives/archives.log ", and they are not visible in…
Sulaiman
  • 101
  • 1
  • 1
0
votes
1 answer

WAZUH All Commands monitor

How to monitor each and every command executed by user, even in sudo level. I have configured audit rules and they are appearing in audit.logs, but I want to view each command timely from server to Kibana/wazuh manager. enter image description here
Sulaiman
  • 101
  • 1
  • 1
0
votes
1 answer

Features' value in KDD99 data set was wrong?

In KDD99 data set, a huge number of connections 32nd and 33rd feature’s value is greater than 100. I can’t understand the reason why used a connection window of 100 connections can get a value which is greater than 100? I consulted a lot of…
0
votes
1 answer

How to get the VLAN ID in snort alert?

I am trying to parse snort alerts and filter necessary information such as vlan id where a malicious internal machine belong to! However, I only can get the message, source and destination IPs, I need to get the VLAN ID too. Thanks
Adel
  • 11
  • 3
0
votes
1 answer

Intrusion Detection System, Security+ question

I'm studying to take the Security+ exam. I'm really having problems figuring out this chart. I understand most of it. Can someone explain the following? Why are there 2 sensors in this picture which both point to analyzer? Why is security…
Adam Outler
  • 1,651
  • 4
  • 19
  • 23
0
votes
0 answers

Intrusion detection system on AWS

Hi i have a project i'm working on, i have some intrusion detection datasets stored in AWS (in S3) extension arff and pcap file, i tried to install SNORT on EC2 fowolling internet tutorial http://sublimerobots.com/2014/12/installing-snort-part-1/,…
Mondher
  • 11
  • 2
0
votes
1 answer

Purpose of the snort´s rules

So for example, why i need scan.rules when there is something like sfportscan preprocessor ? Is it because preprocessor can not detect all the activities and so there is detecting engine using rules with well known signatures of network attacks…
uppermost
  • 1
  • 5
0
votes
1 answer

How to implement Intrusion Detection System in NS2 ?

I want to write a TCL script to implement Intrusion Detection System in NS2. I searched a lot, but I could not find proper help. I implemented basic routing protocols in NS2. I have a bit knowledge in TCL. I want to know how to modify a AODV…
0
votes
0 answers

AIrtel js files loading while connecting to most websites

I am not using airtel internet. When I am trying to open few websites, they show up like they are blocked. If I see inspect and there are 2 javascript files injected somehow. One is http://www.airtel.in/dot/js/jquery-1.11.1.min.js and other is…
Karthik
  • 61
  • 2
  • 2
  • 7
0
votes
1 answer

Add SNORT rules to my detection system

Could any one give me some rules to test Snort (ARP,ICMP,TCP,UDP) and ensure that my system work properly against attacks like DOS or MITM.
Nahla K
  • 1
  • 2
0
votes
2 answers

Intrustion Detection System on the AWS platform

Is there a solution for an intrustion detection system on the AWS platform? Would you have to go 3rd party or do they have their own offering? Thanks!
Justin
  • 2,224
  • 2
  • 22
  • 28
0
votes
1 answer

How to read text file from Snort?

I have a worm that its signature is in .txt file. Now I wanna check it with Snort IDS. I read the the manual page of Snort, But I couldn't find anything. How can I do this?(Is there a command for detecting worms signature using Snort something like…
Richard
  • 69
  • 2
  • 10
0
votes
2 answers

Snort Output - Traffic Type Recognition

Snort does a lot of work and outputs some useful statistics when it is done. Is there any way to find out the type of traffics and type of attacks that snort has detected, other than alerting system? How to recognize the type of traffic in the snort…
Lakshmi Balan
  • 198
  • 12
0
votes
1 answer

How do I use a snort instance to protect a web server

This is an interesting networking one! Any help would be greatly appreciated! I suspect I am not close to resolving the issue. I have a snort IDS instance on AWS with an IP something like 10.10.10.10, and I have a website with an IP address,…
0
votes
2 answers

Attack Signature creation using KDD dataset

I need to create Attack signatures for Signature-Based Intrusion Detection using the KDD data set. Is it possible to use Apriori (or any Association rule learning algorithm) for this task? If not please suggest alternative method.
Anuradha
  • 570
  • 6
  • 20