📜 ⬆️ ⬇️

What is the difference between Snort and Cisco FirePOWER?

I often hear that there is not much point in acquiring Cisco FirePOWER, it is the same Snort, only in a hardware shell. And after the recent release of Snort on the Cisco ISR 4000 series routers, this question has again sounded with a new force. Therefore, I would like in this article to briefly review the key differences between the free distributed Snort intrusion detection system and the Cisco solution family, united under the umbrella name FirePOWER (not to be confused with the Firepower 9300, which is a new Cisco high-performance hardware and modular security platform). This issue has become particularly relevant recently, when a number of Russian developers began to use Snort as the basis for their own intrusion detection systems, after being certified by the FSTEC or the FSB.

Snort

Let's start with a brief background. Snort was created by Martin Reshm in 1998 and very quickly gained popularity as a free intrusion detection system that allows you to write the rules for detecting attacks on your own and without much effort. In fact, the Snort signature description language has become the de facto standard for many intrusion detection systems that have begun to use it in their engines.

The basis of Snort is an engine consisting of five modules:

')


Both before and after Snort, attack detection systems appeared, but it was Snort that earned fame as a de facto standard, which is confirmed by over 4 million downloads of this software from www.snort.org and over 500 thousand registered in the official user community. What caused such a love for Snort? Its language is a description of network security policy violations. On the one hand, this language is very simple and the rule for detecting an attack or other violation of security policies can be written in just a couple of minutes (or even faster). On the other hand, filters, complex queries, combining rules, setting thresholds, taking into account time intervals allow you to write really very complex network event handlers.

At the end of 2014, an alpha version of Snort 3.0 (also known as Snort ++) was announced, in which many ideas that had previously been dusting on the shelf were implemented. In particular, the design of systems has been redesigned, which has become more user-friendly. There was also a mechanism for automatic identification of protocols on all ports, support for parallel packet processing, and the rule description language has become even simpler.

At the end of 2014, another major change in Snort was made, which entered into the release of the 2.9.7 system, without waiting for Snort 3.0 to go into commercial operation. We are talking about OpenAppID, that is, the language for recognition of application protocols and the implementation of what Cisco has called Application Visibility and Control. In essence, we are talking about the mechanism (as a separate preprocessor) of signature description for own applications and their use in decision rules (attack signatures). So far, Snort with OpenAppID is ahead of Cisco FirePOWER in this capability. Now, to describe your applications in Cisco FirePOWER, you need to use either a HEX editor, or give the system a pre-recorded PCAP file with the traffic of the application of interest. This is not very convenient and requires certain skills. The OpenAppID language, which will be supported in Cisco solutions by the end of 2015, makes it easier to implement this task.

Firepower

Three years later, in 2001, Martin Resch founded the commercial company Sourcefire, within which a commercial version of Snort was created, called 3D Sensor, FirePOWER, etc. at various times. Martin Resch’s main goal was to offer customers a ready and automated solution, not requiring great effort on customization and implementation. The second goal was to create a high-performance solution capable of detecting attacks at high speeds of tens of gigabits per second. That was the first generation of Sourcefire devices. Then came the second series of devices, in which the application identification function appeared (in Snort it appeared only last year), the FireAMP malicious code detection mechanism, firewalling, and a number of other functions. In the third generation, a full-fledged ITU of the next generation (NGFW) appeared. In 2011, Cisco announced its intention to acquire Sourcefire (several years earlier, Check Point did not succeed) and from that moment a new life began on the FirePOWER platform.



Currently, this platform is presented in the form of 6 options for implementation:


What is the difference between commercial software of these six platforms and Snort, which can be freely downloaded from the Internet?

What are the differences?

Let me try to highlight the key features that are present in FirePOWER technologies:


























We could stop at this by completing a comparison of protective sensors based on Snort and FirePOWER. But this is not all that is needed for a complete protection system, especially in a corporate environment. Let's see which control functions, incl. and centralized, offered along with Snort or FirePOWER.

Snort itself has no control system. However, the output module allows you to give the results of work to external systems, which the developers who offered the market several different systems to manage, generate reports, analyze and visualize Snort security events did not fail to take advantage of. Among them, ACID (not updated for a long time), BASE , Snorby , Sguil , Aanval (commercial solution). I worked with ACID very, very long time ago when I wrote the book “Detection of attacks”. Moreover, like BASE, ACID does not have advanced analytical capabilities for working with data. I didn’t work with Aanval, and commercial third-party management systems for free Snort are not exactly what you need (although in some cases it is possible). But as for Snorby and Sguil, I can say that the second is more popular. Let's try to compare it with the “native” sensor control system FirePOWER - FireSIGHT Management Center (formerly called Defense Center).



What is Sguil? In essence, this is an event aggregation system from Snort that allows you to visualize that the output module of Snort issues externally — an alarm, a packet's content, and other related information. Next, Sguil allows you to run other tools through it for a more detailed investigation of recorded events. These tools may include:










In principle, if you have the qualifications and time, you can build a good event management system that Snort gives us from a bunch of Sguil and other monitoring tools (for example, those included in Security Onion). But only ... Rules management, sensor configuration, status tracking, updating, backing up the event database, role-based access control, hierarchical management system, report generation ... All this remains inaccessible to Sguil users.



The “native” FireSIGHT Management Center is devoid of these shortcomings. Among its functions:








In fact, FireSIGHT is a means of automating routine tasks that used to be so valuable when responding to incidents. For example, in Snort and FirePOWER, there is a HAT (Host Attribute Table) - an XML file that associates with each IP address the operating systems used on it, as well as the “service port” associations. Snort creates this file manually, which can present some difficulties on a large network. In FirePOWER, this file is created automatically by the RNA and does not require manual work. And there are many such examples.

SGUIL has two advantages over the native management system of the FireSIGHT Management Center. First, it is free. And secondly, it displays data from the sensors in real time; FireSIGHT has a maximum data refresh rate of once per minute. But FireSIGHT allows you to integrate FirePOWER sensors with various external security systems used in the corporate segment — security scanners, firewalls, routers and switches, packet capture systems, security event visualization systems, SIEM, etc. This is done through special APIs that are also missing from the same Snort (although with the help of various scripts you can try to integrate it with a number of similar free protection tools).

Summary

As a conclusion, I would not like to draw any conclusions except one. Statements that FirePOWER technologies, previously owned by Sourcefire, and later acquired by Cisco, and Snort’s free attack detection system, once the basis of Sourcefire solutions, are not the same thing. Well, that is not the same at all. Yes, Snort remains the de facto standard for attack detection systems, but Cisco FirePOWER is much more than just IDS. Here you will find an application-level firewall, URL filtering, malicious code neutralization, built-in event correlation, incident investigation, integration with security scanners, and many other functions that automate routine security tasks.

Source: https://habr.com/ru/post/268207/


All Articles