Movatterモバイル変換


[0]ホーム

URL:


Introduction

The Intrusion Prevention System rules present in Cisco firewalls (before release 7.6) are written based on known and fixed patterns. While these rules, when properly written, are effective at catching all variations of attacks against a known vulnerability, they are not able to detect exploits written for new or unknown vulnerabilities. Building rules for zero-day vulnerabilities takes time, until which, unpatched systems remain vulnerable.

SnortML is a machine learning-based exploit detection engine for the Snort Intrusion Prevention System, introduced in release 7.6. With its new Machine Learning capabilities, attacks never seen before can be detected and blocked in real-time. Coverage can now be written for entire vulnerability classes, providing coverage even for new and unknown vulnerabilities. For the first release of the feature, coverage was provided to detect and block SQL injection attacks. It is now extended to XSS and CMD injection attacks as well. The underlying model, built and trained by Talos, receives updates via the existing Lightweight Security Package (LSP) update system. These updates will include enhancements to XSS, SQL and CMD injection detection, as well as supporting new exploit types over time.

The SnortML rule

The SnortML IPS rules have the following characteristics:

  1. GID: 411
  2. Rule message: prepended with '(snort_ml)'
  3. Enabled by default inMaximum Detection IPS policy

The first SnortML rule introduced in release 7.6 has the following characteristics:

  1. GID: 411,SID: 1
  2. Description: "(snort_ml) potential threat found in HTTP parameters via Neural Network Based Exploit Detection (411:1:1)”

Enabling the SnortML rule

The SnortML rule is enabled by default when using the base intrusion policyMaximum Detection. If the base intrusion policy used in your configuration is other thanMaximum Detection, the SnortML rule will be disabled by default. To enable it follow the below steps:

  1. Login to the FMC GUI. Navigate toPolicies >Intrusion
Navigating to Intrusion Policy

Navigating to Intrusion Policy


  1. Click onSnort 3 Version against the Intrusion Policy you want to edit.

Note – You can read through the noteAbout Intrusion Policies that pops up to understand the Snort 3 version of Intrusion policies. Once you are done reading, click onDismiss.

  1. Under the Summary tab, click onView Effective Policy.
View Effective Policy

View Effective Policy


  1. In the Filter bar, type in 'GID=411' to filter the SnortML rule. Hit Enter.

Note – Explore the other options available for filtering out intrusion rules.


  1. Click on the drop-down menu underRule Action and change the action fromDisabled toBlock.
Rule Action options

Rule Action options


Rule Action changed to Block

Rule Action changed to Block


  1. Once the Rule Action has been changed successfully, go back to the Summary page by clicking on Summary and verify if the number of Overridden rules has increased by one.

Summary of the rules

Summary of the rules



Note - Make sure to apply the modified Intrusion Policy/Maximum Detection Intrusion Policy in your Access Control policy's relevant Access Control rule.

Viewing events generated for the SnortML rule

Unified Event Viewer

  1. Navigate toAnalysis >Unified Events
Navigating to Unified Events

Navigating to Unified Events


  1. In the Search bar at the top type in Intrusion and selectIntrusion Message.


  1. Type in 'snort_ml' and click onApply.
Filtering Unified Events

Filtering Unified Events


  1. Intrusion events generated due to the SnortML rule will be displayed as shown in the example below.
Unified events filtered by Snort_ML rule

Unified events filtered by SnortML rule

To view the details of a particular event, click on the angle bracket on the left-most side of the event row.

Event details will pop up on the right side as below.

Event Details

Event Details

Scroll down through theEvent Details to view further details such as the Snort rule, the URL triggering the rule, etc.


Intrusion Events

  1. Click onAnalysis >Events under theIntrusions section.
Navigating to Intrusion events

Navigating to Intrusion events


  1. Click onTable View of Events to get a detailed view of the Intrusion events.
Table View of Events

Table View of Events

Explore all the columns displayed in this view

  1. Click onEdit Search to filter the events.


  1. Type in snort_ml againstMessage and click onSearch.
Filtering Intrusion events

Filtering Intrusion events


  1. All the Intrusion events generated by SnortML rule will be displayed.
Table view of intrusion events generated by Snort_ML rule

Table view of intrusion events generated by SnortML rule

Using the scroll bar at the bottom, scroll to the right to view all the other columns under Intrusion events viewer.

Summary

SnortML uses advanced algorithms that analyze patterns and behaviors rather than relying solely on predefined signatures. By adapting to new and evolving threats, SnortML rules offer enhanced detection capabilities and quicker responses to emerging threats that traditional signature-based systems might miss.

Additional Resources

https://blog.snort.org/2024/03/talos-launching-new-machine-learning.html

Updated about 9 hours ago


© 2025 Cisco Systems, Inc.
Title of the documentThe current suggested release is 7.6.2Release 10.0 is live!

[8]ページ先頭

©2009-2026 Movatter.jp