Snort Near Real Time Detection Project

I don't think many people noticed this story, but on Thursday Sourcefire Labs published A New Detection Framework on the VRT blog and a NRT page on their labs site. I had a small part in this development due to the Incident Detection Summit I organized late last year. Sourcefire sent an army of developers (I think they had the biggest contingent) to the conference and clearly enjoyed participating. During the event they spoke to participants from multiple security teams and had follow-up discussions with several of us.

One item we emphasized with Sourcefire was the need for analysis of file contents, not just network traffic. As Matt mentions in his latest post, Mike Cloppert and his team have used these approaches very effectively and have even published components of their work as open source projects like Vortex by Charles Smutz. In my NSM in products post last year I called this extracted content and listed it as one of the forms of NSM data.

What does this mean? The basic idea is that you extract content from network traffic, analyze it, record metadata, and so on, and then provide that information to a security analyst. That may sound like an anti-malware approach, but the idea is to provide indicators, not necessarily block transmission. In any case, Sourcefire published a presentation on their site on what their beta code can do. I'm really glad to see them working on this problem and sharing results in a form that interested parties can download and test.

Comments

Anonymous said…
Not quite fireeye, or mcafee ntr.. but a step in the correct direction for sourcefire.
The idea isn't to replicate McAfee NTR or FireEye capability. It's not just about malware execution.
CyberG said…
But to that point, there are a lot of players in the NSM market that are beating SF to the punch with new features. While 4.9 was a nice upgrade, the feature set has been somewhat stagnant for awhile now. I'm glad they are moving in the right direction now in trying to become a leader again, instead of keeping the status quo in IDS. Now if they could just create a SF Splunk App that shows payload, I would be drinking the SF kool-aid again.

Popular posts from this blog

Zeek in Action Videos

New Book! The Best of TaoSecurity Blog, Volume 4

MITRE ATT&CK Tactics Are Not Tactics