argus and snort ?

Russell Fulton r.fulton at auckland.ac.nz
Mon Sep 11 20:39:36 EDT 2000


On Mon, 11 Sep 2000 19:40:51 -0400 Carter Bullard <carter at qosient.com> 
wrote:

> 
> So what is snort doing for you guys that is helping?
> Is there some nugget of goodness that we can add to
> argus that will give the same info?
> 

I have been running snort for about two weeks.  I have spent a lot of 
time trimming out rules with high false +ve rates -- I've dumped most 
of the web and mail stuff.  

During that time snort did pick up two attempts to expliot the sgi 
Telnet bug -- one of these was successful (I wonder how many there 
were before I got snort up). In this case I was able to get hold of the 
administrator and he quickly confirmed the box was 'r00ted'.  We would 
have not found out until the attackers did something obvious with the 
box in question without snort or something similiar (or a much tighter 
system administration precedures -- the clues were there when they 
looked i.e no SYSLOG :( ).

What I want to use snort for is for detecting attacks such as buffer 
overflows which have fairly easily recognisable fingerprints.  

The patter of activity I see from crackers now falls into two classes. 
Reconnaissance/target selection which usually consist of widespread 
scans that we see in our argus logs everday and actual attacks which 
come from completely different addresses.  The follow up telnet session 
are usually from another address.  (this was the case with our last 
compromise).

Argus is great for finding patterns in traffic that indicate probing -- 
I have just detected a scan from Israel 62.0.55.65 (if you want to look 
;-) which is probing POP and IMAP ports on about 5 to 10 addresses per 
day (there is also, what I believe to be, background decoy traffic at 
about 5 packets per hour).  What argus can't do is detect one telnet 
session from a Brazilian university machine that compromised our sgi 
box.  (Actually they had 3 goes before they succeeded, presumably 
trying different offsets).  

31 Aug 00 21:00:03      tcp   143.107.99.55.4023  <-> 
130.216.185.206.23    1      1       0         12       sSE
31 Aug 00 20:59:38 d    tcp   143.107.99.55.4024  <-> 
130.216.185.206.23    16     15      312       226      sSE
31 Aug 00 21:02:00      tcp   143.107.99.55.4024   -> 
130.216.185.206.23    2      2       0         0        sSEFC
31 Aug 00 21:03:00 d    tcp   143.107.99.55.4026   -> 
130.216.185.206.23    9      10      230       78       sSEFC
31 Aug 00 21:02:07 *    tcp   143.107.99.55.4025  <-> 
130.216.185.206.23    14     13      260       126      sSEFC

This was followed a few seconds later by telnet sessions for a UK dialup
ISP (who never responded to my complaints, sigh...)

What I am trying to say here is that snort and argus do fundamentally 
different things and should stick to what they do best.  I have come to 
the conclusion, after some thought, that I would rather have two tools 
that each do their particular job well than on which does both jobs 
less well (even if it isnt badly).

Russell.



More information about the argus mailing list