18
Chapter 1     Introduction to Intrusion Detection and Snort
Figure 1 8 Connecting an IDS in a switched environment.
Note that when the IDS is connected as shown in Figure 1 8, data flowing among
the company servers is not visible to the IDS. The IDS can see only that data which is
coming from or going to the Internet. This is useful if you expect attacks from outside
and the internal network is a trusted one.
1.5 TCP Stream Follow Up 
A new preprocessor named Stream4 has been added to Snort. This preprocessor is capa 
ble of dealing with thousands of simultaneous streams and its configuration will be dis 
cussed in Chapter 4. It allows TCP stream reassembly and stateful inspection of TCP
packets. This means that you can assemble packets in a particular TCP session to find
anomalies and attacks that use multiple TCP packets. You can also look for packets
coming to and/or originating from a particular server port. 
1.6 Supported Platforms
Snort is supported on a number of hardware platforms and operating systems. Currently
Snort is available for the following operating systems:
  Linux
  OpenBSD






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

toronto web hosting

 

Our partners: PHP: Hypertext Preprocessor Cheap Web Hosting JSP Web Hosting Ontario Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Java Hosting Cheapest Hosting

Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved