Skip to content

turris-cz/morce

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

MORCE - Malice Observing, Reporting and Collecting Engine

MORCE is a collection of simple scripts that integrates Snort into OpenWrt and provides easy means how to be notified about any potential security issue (as recognized by Snort) and how to store and manage a history of such events.

Installation

MORCE depends on snort3 including snort2lua tool to convert rules. Installation is pretty straight forward. Apart from Snort itself you need to deploy the following files into following directories:

init/morce -> /etc/init.d/morce
logger/alert_morce.lua -> /usr/share/morce/loggers/alert_morce.lua

Cron

It is highly recommended to setup a cron script that would periodically check for updated rules. That can be done via calling /etc/init.d/morce update_rules. Whenever new rules are detected, Snort is restarted and rules are taken into account. In general it doesn’t make sense to trigger this action more often then once a day as currently selected rules publishers are publishing new rules at most once a day.

Rules

By default MORCE uses Snort 3 Community Rules and subset of Open Emerging Threads ruleset. You can use /etc/init.d/morce update_rules to check for updated rules.

Configuration

Configuration is done via /etc/config/morce UCI file. You can specify there how you want to be notified, where do various databases live and also a subset of Emerging Threads ruleset that you want to use.

For syntax of specific options, see default uci file.

About

PoC of IDS integration using Snort.

Resources

License

Stars

Watchers

Forks

Packages

No packages published