The cyber security industry is filled with many great options for intrusion detection and prevention solutions for your perimeter. However, there are only a small number of tried-and-true platforms that have become ubiquitous and used as a foundation for other newer platforms. One of the most prominent open-source solutions is Snort. With Snort installed in the environment at the perimeter, a security team can not only forensically see what took place on the network, but also see how it happened. For the purpose of this article, we are going to focus on Snort for intrusion detection analysis. We will be walking through common scenarios that the incident response team will have to investigate from time to time.
Read the blog