Previous Section  < Day Day Up >  Next Section

Chapter 9. Tuning and Thresholding

This chapter revolves around controlling false positives (alerts generated by nonmalicious activity) and managing the load on the system running Snort. The opposite of a false positive is a false negative—an actual malicious packet that does not trigger an alert. We will discuss the causes of missed alerts and some steps for remediation of this gap. We will examine some of the challenges surrounding the initial tuning and customization of the Snort sensor, as well as the ongoing challenges of keeping the information the sensor reports useful. All your work installing and configuring Snort is wasted if the real alerts are not noticed, or lost in the noise of thousands of false positives. We will also discuss how to keeps things managed, from "pass" rules to thresholding and suppression rules.

Many of these strategies are thinly documented and have arisen from the use of Snort in very high bandwidth environments (an OC-48 SONET ring connecting multiple data centers with three redundant OC-3s to the Internet). While these strategies come from environments that not many users of Snort will encounter (even in most businesses), they are useful for anyone running Snort.

    Previous Section  < Day Day Up >  Next Section