Serverspace accelerated the answering of support requests by 40%
July 5, 2023
Updated July 9, 2023

How to setup an anti-DDoS system on Debian: Part 4

Networks Security

Previous episode

In the previous episode we delved into the concept of automating the creation of network data profiles, which proves invaluable in tackling intricate and uncertain scenarios. That should help our system to create normal profile traffic to identify legitimate users and requests. But we need to automate usage this profile, because of manually in a large network infrastructure possibility to control and filtering traffic is quite small. In that instruction, we will consider installation of IPS/IDS system: rapidly deployment. Let’s have a look!


For our purposes we will use pretty popular and open—source solution, which provide a large degree of stability in deployment, the audit will add confidence in the security of the software. Bundle of Snort and Snorby represent main module with IDS/IPS and web interface accordingly order. By incorporating Snort into your deployment, you gain its extensive rule-based detection capabilities. Snort examines network traffic and compares it against a predefined set of rules to identify potential security threats such as malware, network attacks, or policy violations. It can actively block or alert on suspicious activity, providing an added layer of security to your system.

Install and exploit

At the beginning write this command to update the index of the package :

sudo apt update –y && sudo apt upgrade –y
Update OS
Screenshot №1 — Update OS

All packages and path to utility will be update, but pay attention to choose command for upgrade this. Because of this command less stable than upgrade, however, it's you decision. For the next stage install Docker, if say about this utility in two words: compiled application. You don't need to find repositories with deprecated libraries and manually writes path for connecting different modules in your system. Rapidly deployment and comfortable usage:

sudo apt install
Screenshot №2 — Install Docker

After this check how finished installation and how process was started via command below:

systemctl status docker
Status of module
Screenshot №3 — Status of module

Below of summary information we can see journal of process, make shure that all packets are alright, such as in the picture above! Next we have to login into Docker repository and register on the site:

Screenshot №4 — Site

Fill all needed credentials and confirm your email, then login on the server via command:

docker login
Screenshot №5 — Login

When you enter the password, you will not see anything data excluding login. Now we can start pulling or downloading Docker container. Process is pretty simple. Enter command below:

docker pull ciscotalos/snort3
docker pull polinux/snorby
Pulling container
Screenshot №6 — Pulling container

However, for normal the system to work, we also need database, which will POST and GET information for our system. Let's install:

docker pull million12/mariadb
docker run \
-d \
--name snorby-db \
-p 3306:3306 \
--env="MARIADB_USER=admin" \
--env="MARIADB_PASS=admin" \
Run DB
Screenshot №7 — Run DB

In line indicate user login and password, enter your credentials and save in secure folder! Then run container with main module:

docker run --name snort3 -h snort3 -u snorty -w /home/snorty -d -it ciscotalos/snort3 bash
docker run \
-d \
--name snorby \
-p 3000:3000 \
--env="DB_ADDRESS=localhost:3306" \
--env="DB_USER=admin" \
--env="DB_PASS=admin" \

After running this component we cause CLI version:

docker exec -it snort3 bash
Snort config
Screenshot №8 — Snort config

After that you will see bash shell which you can use for configurating IDS/IPS. You have to use normal traffic profile that we build for seven days and set parameters accroding to them or you can use examples of security. For go out bash shell of container you need to type:


Then we need install graphical shell for use Snorby:

sudo apt install ubuntu-desktop
Snort config
Screenshot №9 — Install Gnome

Open web console and type data:

Login panel
Screenshot №10 — Login panel

Go to the http://localhost:3000 and enter default credentials Username: and Password: snorby

Web panel
Screenshot №11 — Web panel

And system successfully was installed!


We introduced the installation of an IPS/IDS system for rapid deployment. We opted for a popular open-source solution that provides stability and security auditing—the combination of Snort and Snorby. Snort, functioning as the main module with IDS/IPS capabilities, examines network traffic against predefined rules to detect potential security threats and can actively block or alert on suspicious activity. Snorby complements Snort by offering a web interface for convenient management.

The installation process involved updating the package index and upgrading the operating system. Docker, a compiled application facilitating rapid deployment and easy integration of modules, was installed. The status of the Docker service was checked to ensure a successful installation. Subsequently, login credentials were obtained from the Docker repository, and Docker containers for Snort, Snorby, and the necessary database (Mariadb) were pulled.

To set up the database, a container named snorby-db was run with appropriate environment variables for user login and password. Similarly, containers for Snort (snort3) and Snorby were launched, with Snorby configured to connect to the MariaDB instance. Accessing the Snort container's bash shell allowed for further configuration of the IDS/IPS system using either a customized traffic profile or predefined security examples.

Now you can check previous episodes instructions of that series:

5 out of 5
Аverage rating : 5
Rated by: 1
1101 CT Amsterdam The Netherlands, Herikerbergweg 292
+31 20 262-58-98
700 300
700 300

You might also like...

We use cookies to make your experience on the Serverspace better. By continuing to browse our website, you agree to our
Use of Cookies and Privacy Policy.