Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia



Similar documents
Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics

A Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics. Risto Vaarandi Paweł Niziński

Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory

Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013

Reliable log data transfer

The syslog-ng Premium Edition 5F2

The syslog-ng Premium Edition 5LTS

Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon Max Putas

Log management with Logstash and Elasticsearch. Matteo Dessalvi

Log managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide

An Introduction to Syslog. Rainer Gerhards Adiscon

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Centralized logging system based on WebSockets protocol

Network Monitoring and Management NetFlow Overview

syslog-ng 3.0 Monitoring logs with Nagios

Distributed syslog architectures with syslog-ng Premium Edition

Scalable Extraction, Aggregation, and Response to Network Intelligence

Log infrastructure & Zabbix. logging tools integration

Introduction to Netflow

Logging on a Shoestring Budget

Performance Guideline for syslog-ng Premium Edition 5 LTS

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Detection of illegal gateways in protected networks

Netflow Overview. PacNOG 6 Nadi, Fiji

Processing millions of logs with Logstash

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Flow Based Traffic Analysis

Network Monitoring & Management Log Management

Barracuda Networks Web Application Firewall

Wireshark Developer and User Conference

Cisco PIX vs. Checkpoint Firewall

SolarWinds Log & Event Manager

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Adding Indirection Enhances Functionality

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

SolarWinds Certified Professional. Exam Preparation Guide

Network Management & Monitoring

April 8th - 10th, 2014 LUG14 LUG14. Lustre Log Analyzer. Kalpak Shah. DataDirect Networks. ddn.com DataDirect Networks. All Rights Reserved.

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

SNARE Agent for Windows v Release Notes

Network Monitoring & Management Log Management

orrelog SNMP Trap Monitor Software Users Manual

NETWORK TRAFFIC ANALYSIS: HADOOP PIG VS TYPICAL MAPREDUCE

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

Configuring Logging. Information About Logging CHAPTER

PANDORA FMS NETWORK DEVICE MONITORING

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

Network Monitoring & Management Log Management

PANDORA FMS NETWORK DEVICES MONITORING

RSA Authentication Manager

Real-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH

Flow-based detection of RDP brute-force attacks

NETASQ MIGRATING FROM V8 TO V9

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

How To Set Up Foglight Nms For A Proof Of Concept

Management, Logging and Troubleshooting

Introduction to Network Discovery and Identity

Intrusion Detection Systems (IDS)

Research on Errors of Utilized Bandwidth Measured by NetFlow

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

syslog-ng: nyers adatból Big Data

Introduction to Endpoint Security

How to configure an Advanced Expert Probe as NetFlow Collector

Network Traffic Analysis

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Using Logstash and Elasticsearch analytics capabilities as a BI tool

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

NfSen Plugin Supporting The Virtual Network Monitoring

Network Traffic Analysis using HADOOP Architecture. Zeng Shan ISGC2013, Taibei

Architecture and Mode of Operation

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

Firewalls. Ahmad Almulhem March 10, 2012

Application Note. Onsight Connect Network Requirements v6.3

Network monitoring systems & tools

Network Monitoring Comparison

Andrew Moore Amsterdam 2015

Detecting Botnets with NetFlow

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

11.1. Performance Monitoring

CS5008: Internet Computing

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Configuring Syslog Server on Cisco Routers with Cisco SDM

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Information Retrieval Elasticsearch

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30

Transcription:

Log Management with Open-Source Tools Risto Vaarandi SEB Estonia

Outline Why use open source tools for log management? Widely used logging protocols and recently introduced new standards Open-source syslog servers Open-source log management tools 2

Why use open source tools for log management? Commercial SIEM and log management frameworks: many frameworks are consultant-oriented have complex design and insufficient documentation prohibitive deployment and licensing costs some frameworks repeat a number of design mistakes of network management solutions (made almost two decades ago!) Past experience with network management solutions: Phase 1: initial marketing hype, followed by a number of success stories in the context of large and wealthy institutions Phase2: disappointment among many potential customers (failed deployments, prohibitive pricing, etc.) and search for alternatives Phase3: appearance of well-designed open-source solutions which become widely used and acknowledged, especially by small- and mid-size enterprises 3

Traditional log collection protocols The scene of log collection protocols was relatively stable for two decades (from 1990s until 2009) BSD syslog the only cross-vendor protocol designed specifically for logging UDP based plaintext, thus resource-efficient, but unreliable and not secure Simple message layout in the UDP frame priority, simple timestamp, host name, program name, unstructured message text 4

New log collection protocols IETF syslog (2009) support for including structured data in messages, UDP and TCP based transport, encryption and authentication, detailed timestamps CEE (Common Event Expression) logging standard proposal by MITRE (2013) use JSON format inside originally unstructured BSD/IETF syslog message fields. Note that CEE is no longer developed by MITRE. Other protocols various flavors of BSD and IETF syslog (e.g., BSD syslog over TCP), GELF, SNMP trap messages, etc. 5

Examples # Traditional BSD syslog priority value 28 encapsulates facility value 3 # (daemon) and severity value 4 (warning): 3*8 + 4 = 28 <28>Nov 17 12:33:59 myhost2 ids[1299]: port scan from 192.168.1.102 # IETF syslog note high granularity timestamps and two blocks of structured data <28>1 2012-11-17T12:33:59.223+02:00 myhost2 ids 1299 - [timequality tzknown="1" issynced="1"][origin ip="10.1.1.2"] port scan from 192.168.1.102 # CEE message format use standard BSD syslog message for transporting # structured data in JSON format <28>Nov 17 12:33:59 myhost2 ids[1299]: @cee:{"pname":"ids","pid":1299,"msg":"port scan from 192.168.1.102", "originip":"10.1.1.2","action":"portscan","src":"192.168.1.102"} 6

Why pass structured data in log messages? Unstructured message fields often contain additional information about event which needs to be highlighted It is much easier to parse structured data (keyword-value pairs) than unstructured free-format strings Structured data can be used without extra parsing JSON format is supported by several log management frameworks and databases (e.g., Elasticsearch) 7

Log collection on Linux platform db GUI openlog(3) syslog(3)... local programs /dev/log network port incoming messages kernel /proc/kmsg syslog server configuration to local logfiles /var/log/... /etc/syslog-server.conf messages to remote syslog servers messages from other nodes 8

Syslog servers rsyslog http://www.rsyslog.com + fast message processing, efficient multithreading, designed to handle at least 150-200K messages per second (see the paper Rsyslog: going up from 40K messages per second to 250K by Rainer Gerhards from Linux Kongress 2010) + backwards compatible with UNIX syslogd configuration directives + has a number of unique features and advantages over competitors (disk based buffers, support for Elasticsearch database, Guardtime keyless signatures, etc.) + default logging system for most Linux distributions - configuration language supports several syntax flavors which might be sometimes confusing for inexperienced users 9

Syslog servers syslog-ng http://www.balabit.com/network-security/syslog-ng/ + a flexible and readable configuration language which allows for specifying complex configurations + single-threaded until the 3.2 version, but multi-threading has been introduced into recent versions which considerably improves scalability and performance + well documented - open-source edition does not support disk based buffers - no support for Elasticsearch (although could be configured through a self-developed output plugin) 10

Syslog servers nxlog http://nxlog-ce.sourceforge.net/ + native support for Windows platform and Windows Event Log + supports the use of embedded Perl constructs for message processing + supports a number of input and output types not supported by competitors (e.g., accepting input events from SQL databases, producing output events in GELF format, etc.) - poor message filtering performance 11

Elasticsearch DB for log management http://www.elasticsearch.org/ Apache Lucene based nosql database technology that is frequently used for storing log data native support for distributed operations and building clusters allows for splitting indexes into parts (shards) and distributing shards over several nodes (e.g., split an index into 2 shards and distribute them over 2 nodes, turning disks at individual nodes into a single logical storage space) indexes can be configured to have one or more replicas which increases fault tolerance (e.g., split an index into 2 shards and configure the index to have 1 replica, and distribute resulting 4 shards across 4 nodes) builtin support for data compression (important when storing large volumes of log data) supported by several log management tools (Kibana, Graylog2, logstash, rsyslog) 13

Log management tools Kibana http://www.elasticsearch.org/overview/kibana/ Kibana is a GUI for searching log data stored into Elasticsearch DB Kibana is designed to work with logstash log preprocessing tool, but can accept data from any other tool which is able to store events to Elasticsearch in a recognizable way (e.g., rsyslog) Kibana is lightweight, implemented as Javascript which runs in the client web browser and talks directly to Elasticsearch, and contains only searching and reporting functionality (e.g., user authentication and SSL connectivity has to be accomplished with external tools like Apache reverse proxy) When building a Kibana based log management solution, you are creating the system from well-documented and well-established building blocks, and thus having the opportunity for many customizations during initial installation and later maintenance 14

Kibana web interface 15

Log management tools Graylog2 http://graylog2.org/ A full log management solution consisting of a server for log message reception (syslog, GELF, etc.) and a GUI Many configuration and admin tasks (setting up event inputs, checking the status of Elasticsearch DB, interactive creation and testing of message parsers, etc.) can be accomplished through a web interface in a user-friendly way Graylog2 supports users with different roles and password authentication Earlier versions of Graylog2 employed single-server approach which limited the system scalability, while most recent versions allow to run several servers in parallel 16

Graylog2 web interface 17

Other log management tools Logstash (http://logstash.net/) - flexible log parsing and conversion tool, supports flexible Grok parsing language. Supports large number of input and output protocols, often used for receiving raw log data and storing it to Elasticsearch ELSA (http://code.google.com/p/enterprise-log-search-and-archive/) - a log management system which is built on top of syslog-ng, MySQL and Sphinx 18

Writing to Elasticsearch rsyslog or logstash? Logstash parsing is more powerful and flexible, can be done with Grok and regular expressions. Also, logstash supports adding GeoIP information to parsed events. Rsyslog parsing is much faster, but less flexible than with logstash Use both in parallel 19

Netflow protocol Proposed by Cisco in 1990s, nowadays supported by many major vendors A Netflow-enabled network device (e.g., router, switch, dedicated probe) collects network traffic statistics and exports it to collector over UDP Traffic statistics consists of flow records, where each record describes some network flow Network flow unidirectional sequence of packets which share transport protocol, source and destination IP, source and destination port, and few other parameters (e.g., type of service) 20

Example of collected Netflow data The following two records represent a successfully negotiated and completed TCP connection from client 10.3.1.1 port 48896 to the HTTP service (port 80) running at the server 10.2.1.1: Start = 2013-02-18 00:04:05.733 Duration = 0.014 TCP 10.3.1.1:48896 -> 10.2.1.1:80 TCPflags =.AP.SF Packets = 5 Bytes = 513 Start = 2013-02-18 00:04:05.734 Duration = 0.010 TCP 10.2.1.1:80 -> 10.3.1.1:48896 TCPflags =.AP.SF Packets = 4 Bytes = 375 21

How to collect and use netflow data Open-source software packages for collecting Netflow NfSen (http://nfsen.sourceforge.net/) SiLK (http://tools.netsa.cert.org/silk/) Flow-tools (http://www.splintered.net/sw/flow-tools/) unmaintained Logstash can receive Netflow and store it to Elasticsearch! What you might be interested in finding in Netflow data Flows with unusual combinations of TCP flags (e.g., FIN without ACK) Flows which represent connections to/from known bad IP addresses Unexpected spikes in traffic volumes (measured in number of bytes, packets, flows) associated with certain sources (e.g., foreign or bad IP addresses) 22

Thank you! 23