pfSense Support Subscription

Author Topic: What to use to report and analyse snort alerts?  (Read 517 times)

0 Members and 1 Guest are viewing this topic.

Offline bimmerdriver

  • Sr. Member
  • ****
  • Posts: 502
  • Karma: +19/-3
    • View Profile
What to use to report and analyse snort alerts?
« on: September 09, 2017, 01:07:36 pm »
Before I switched to pfsense, I used Sophos UTM. It is closed source, but had some nice features, in particular analysis and reporting of intrusion attempts. UTM used snort for collecting and detecting information and it had an analysis and reporting layer on top of snort. Even a few years ago, it generated reports and it was possible to query alerts to find out what addresses are attacking, what addresses are being attacked, etc. Without this capability, I find that snort is not nearly as useful as it could be. It basically fills the general log with events.

I looked on the snort wikipedia page and it lists snorby, BASE, squil and aanva as "third-party" applications. I've seen other references to squert and ELSA. The only one of these packages that appears to be under active development is aanval. aanval is not open-source, but they have a free "lite" version.

I'm interested to know what everyone is using and if anyone has tried aanval.

Offline bmeeks

  • Hero Member
  • *****
  • Posts: 3103
  • Karma: +800/-0
    • View Profile
Re: What to use to report and analyse snort alerts?
« Reply #1 on: September 09, 2017, 06:54:07 pm »
This feature (elaborate log analysis and various degrees of automation for it) is one area where open source software sometimes falls a bit short.  Snorby was popular for a while, but as you mentioned I think it may no longer be as supported as it once was.  Some folks I know are using an ELK stack for this kind of collection and analysis.  I did use Snorby a couple of years or so back, but gave up because the virtual machine would frequently go out to lunch.  Usually it would be something related to Ruby and all those "gem things" ...  ;).  Also found updating Snorby to be a pain in the butt because of Ruby.  I have never developed an affection for Ruby ...  :-\.

As you found, the closed-source packages are better at this automated log analysis stuff.  Sorry to not be of much help.  Maybe some other users can chime in with better experiences.

Bill


Offline rlrobs

  • Full Member
  • ***
  • Posts: 159
  • Karma: +9/-0
    • View Profile
Re: What to use to report and analyse snort alerts?
« Reply #2 on: September 10, 2017, 01:42:48 pm »
Graylog its excelent!

Offline V3lcr0

  • Full Member
  • ***
  • Posts: 167
  • Karma: +5/-0
    • View Profile
Re: What to use to report and analyse snort alerts?
« Reply #3 on: September 11, 2017, 05:03:52 pm »
I had asked a similar question on Slack...I was advised to explore setting up ..."a SPAN/port..." and use https://securityonion.net.

Additional advice was to use "...barnyard2 to send logs to an aggregation for tuning and analysis."

I haven't followed up on the solutions but its on my list.

Good luck!

Offline JasonAU

  • Jr. Member
  • **
  • Posts: 32
  • Karma: +0/-0
    • View Profile
Re: What to use to report and analyse snort alerts?
« Reply #4 on: September 12, 2017, 03:03:11 am »
Graylog its excelent!

I've heard a few people recommend this now I've had similar questions as the OP myself I might have to sit down and check out Greylog some day
Brisbane Queensland Australia

Offline bimmerdriver

  • Sr. Member
  • ****
  • Posts: 502
  • Karma: +19/-3
    • View Profile
Re: What to use to report and analyse snort alerts?
« Reply #5 on: September 12, 2017, 03:06:36 pm »
There is a free "lite" version of anvaal. I'm considering giving it a try, just have to find the time.

Offline JasonAU

  • Jr. Member
  • **
  • Posts: 32
  • Karma: +0/-0
    • View Profile
Re: What to use to report and analyse snort alerts?
« Reply #6 on: September 13, 2017, 03:35:32 am »
Out of interest are most of the solutions mentioned something you would run on a separate server rather than the Pfsense box ?

Or can some of them be installed (perhaps not from the default package manager) on the same box
Brisbane Queensland Australia

Offline bmeeks

  • Hero Member
  • *****
  • Posts: 3103
  • Karma: +800/-0
    • View Profile
Re: What to use to report and analyse snort alerts?
« Reply #7 on: September 13, 2017, 07:44:43 am »
Out of interest are most of the solutions mentioned something you would run on a separate server rather than the Pfsense box ?

Or can some of them be installed (perhaps not from the default package manager) on the same box

You almost certainly want to run any log analysis software on a separate box.  Remember all software is likely to have some vulnerability someplace in the code.  So putting lots of extra software on your firewall expands the attack surface by opening up more potential vulnerabilities for a bad guy to exploit.  There is also the issue of shared common library compatibility problems as you start to install stuff that will put its own versions of libraries on the system.  Remember "DLL Hell" from Windows ...  ;).

Most log analysis packages are likely to contain some type of database to hold either the raw data, the analysis results or both.  A VMware or similar server would be a good choice.  Put the log analysis package on a virtual machine by itself.  Then you have isolated any potential vulnerabilities.  And with a dedicated virtual machine, there is never any worry about shared library compatibility issues.

Bill
« Last Edit: September 13, 2017, 07:49:29 am by bmeeks »

Offline repomanz

  • Newbie
  • *
  • Posts: 22
  • Karma: +0/-0
    • View Profile
Re: What to use to report and analyse snort alerts?
« Reply #8 on: October 19, 2017, 09:53:04 pm »
Speaking of Aanval.  Does anyone have a guide for pfsense + Aanval on Ubuntu they'd like to share? If not I'll just dig through all the docs on Aanval wiki.

Offline tfirew

  • Newbie
  • *
  • Posts: 1
  • Karma: +0/-0
    • View Profile
Re: What to use to report and analyse snort alerts?
« Reply #9 on: November 08, 2017, 01:22:13 pm »
On Aanval,

I did try this out and found it to really be a commercial product. It was not of much use to me in the "freeware" state. In fact I would not call it freeware but instead trialware. Support is limited or non-existent for a free user.

2 cents

Bill