The popular open source intrusion prevention system (IPS) Snort has been completely rewritten and fitted with several new features, Cisco announced on Thursday.
When it acquired Sourcefire for $2.7 billion in October 2013, Cisco promised to continue supporting Snort and the project has now become the foundation of the company’s Next-Generation IPS. With more than 5 million downloads, Snort is the standard in intrusion detection, and Snort rules are being used by numerous security researchers to share information on bad traffic.
Now, Cisco has released the alpha of Snort++, or Snort 3.0, and the company is asking researchers to give the new version a try.
“This Alpha release is for you to play with. It’s for you to break, it’s for you to test and get back to us about. We need you to break it; we want you to break it. This is not ready for production and should not be used for production, so that gives us the full freedom to work with our community to make Snort 3.0 as strong as possible,” Joel Esler, Threat Intelligence Team Lead and Open Source Manager at Cisco, wrote in a blog post.
It will take months of work until the final version of Snort 3.0 is released. In the meantime, Cisco will publish additional materials to detail the changes and improvements.
First of all, Snort 3.0 brings some changes that make the IPS more user-friendly. This includes built-in documentation and configuration, error support, and configuration verification on startup. Cisco says it’s trying to make the tool easy to learn and use.
The Snort rule language has also been simplified to make it easier to write rules. The list of improvements in this area also includes sticky buffers, custom HTTP buffers, and auto-detection of all protocols.
The command-line shell has been updated and it now allows users to reload a configuration, and even pause and resume a detection. Snort 3.0 also includes support for multithreading, which enables researchers to maintain a single persistent configuration for multiple threads.
Snort 3.0 was developed after Martin Roesch, vice president and chief architect of the Cisco Security Business Group and creator of Snort, started rethinking the tool’s architecture. Some of the new concepts were integrated into the main codebase, but others couldn’t have been rolled out without completely rewriting the tool, Esler explained.
The source code for Snort 3.0 is available on GitHub.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
- CISA, NSA Issue Guidance for IAM Administrators
