Snort.docx - 4 Write a two-paragraph conclusion regarding your experiences in this activity and the possibility of using snort as a HIDS NIDS or NIPS

Snort.docx - 4 Write a two-paragraph conclusion regarding...

This preview shows page 1 - 2 out of 4 pages.

4. Write a two-paragraph conclusion regarding your experiences in this activity and the possibility of using snort as a HIDS, NIDS, or NIPS solution. Be sure to review the value of Rules in your conclusion. Submit these two paragraphs (with conclusions) along with two (2) screenshots showing any snort activity as your Exercise Response.I completed this assignment using Kali Linux Snort VM (VirtualBox). This activity taught me that Snort is an Intrusion Detection System (IDS) that works as a defines against exploit that allows users to capture the real time traffic analysis and packet logging. The snort –v command displays IP and TCP/ICMP headers. While, snort –dv displayers the packet data as well as the headers. It allows users to write rules describing well known and common vulnerability exploitation attempts, violations of the security policy as well as conditions under network packets might be anomalous. Snort - K displays the logging mode while - A sets alert mode. There are many other flags that as
Background image
Image of page 2

You've reached the end of your free preview.

Want to read all 4 pages?

  • Spring '13
  • BogdanCarbunar
  • Computer Security, Network intrusion detection system

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture