OSSEC & OSSIM Unified Open Source Security. san8ago@alienvault.com



Similar documents
Log Analysis using OSSEC

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

How to configure High Availability (HA) in AlienVault USM (for versions 4.14 and prior)

Deploying HIDS Client to Windows Hosts

Open Source Security Tool Overview

Intrusion Detection in AlienVault

OSSIM. Open Source Security Information Management. Brian E. Lavender. Sac State. CSC 250, Spring Final Project

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

To read more Linux Journal or start your subscription, please visit

Log Analysis using OSSEC

Compliance Solu.ons with a Budget in Mind

The SIEM Evaluator s Guide

Device Integration: CyberGuard SG565

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Fighting Advanced Persistent Threats (APT) with Open Source Tools

Unified Security Management and Open Threat Exchange

Suricata IDS. What is it and how to enable it

Security Information and Event Management for Private Clouds

OWASP Logging Project - Roadmap

AlienVault SIEM System Description COPYRIGHT ALIENVAULT Copyright AlienVault LLC, 2010 alienvault.com

AlienVault. Unified Security Management 5.x Configuration Backup and Restore

Device Integration: Checkpoint Firewall-1

Device Integration: Cisco Wireless LAN Controller (WLC)

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

COUNTERSNIPE

PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard

AlienVault Installation Guide

BEGINNER S GUIDE to. Open Source Intrusion Detection Tools.

Assets, Groups & Networks

Collecting Windows logs using Snare

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Project Artillery Active Honeypotting. Dave Kennedy Founder, Principal Security Consultant

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

AlienVault. Unified Security Management 5.x Configuring a VPN Environment

Device Integration: Citrix NetScaler

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Who am I? BlackHat RSA

Fighting Advanced Persistent Threats (APT) with Open Source Tools

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Monitoring VMware ESX Virtual Switches

Security Monitoring and Architectures for Security Logging

O S S I M. Open Source Security Information Manager. User Manual

How to enable File Integrity Monitoring (FIM)

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Host Based Intrusion Detection

McAfee Network Security Platform 8.2

AlienVault Unified Security Management (USM) x. Configuring High Availability (HA)

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Network Security Monitoring

CSA SDP Working Group

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

How To Create Situational Awareness

Intrusion Detection Systems (IDS)

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Evolving Threat Landscape

Linux Network Security

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

WHAT IS LOG CORRELATION? Understanding the most powerful feature of SIEM

How to send s triggered by events

System Monitoring and Network Intrusion Detection using DDS and CEP

Reduce Security Compliance Costs Using Open Source

How To Protect A Network From Attack From A Hacker (Hbss)

Intrusion Detection Systems

Introduction of Intrusion Detection Systems

A Review of Open Source Tools to Detect and Prevent DoS Attack

Lesson 5: Network perimeter security

SourceFireNext-Generation IPS

Security Power Tools

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

RAVEN, Network Security and Health for the Enterprise

Alert (TA14-212A) Backoff Point-of-Sale Malware

Real World Big Data Architecture - Splunk, Hadoop, RDBMS

How To Fix A Fault Notification On A Network Security Platform (Xc) (Xcus) (Network) (Networks) (Manual) (Manager) (Powerpoint) (Cisco) (Permanent

The Bro Network Security Monitor. Broverview

This is a picture of a kiqen

Open Source in Government: Delivering Network Security, Flexibility and Interoperability

Find the needle in the security haystack

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Cisco IPS Tuning Overview

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

IBM Security IBM Corporation IBM Corporation

Defending Computer Networks Lecture 7: Port Scanning. Stuart Staniford Adjunct Professor of Computer Science

Intrusion Detection Architecture Utilizing Graphics Processors

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

Release Notes 7.5 [formerly IntruShield]

AlienVault Unified Security Management for Government v4.12 & CyberC4:Alert v4.12 Configuration for Common Criteria

Security Onion. Peel Back the Layers of Your Network in Minutes. Doug Burks

Transcription:

OSSEC & OSSIM Unified Open Source Security san8ago@alienvault.com

Why OSSIM Open Source SIEM GNU GPL 3.0 Provides threat detec)on capabili8es Monitors network assets Centralizes Informa)on and Management Assesses threats reliability and risk Collabora8vely learns about APT hlp://communi8es.alienvault.com/

OSSIM Architecture Normalized Events Configura8on & Management

OSSIM Embedded Tools Assets nmap prads Behavioral monitoring fprobe nfdump ntop tcpdump nagios Threat detec)on ossec snort suricata Vulnerability assessment osvdb openvas

OSSIM Collectors

OSSIM Collector Anatomy [apache log] 76.103.249.20 - - [15/Jun/2013:10:14:32-0700] "GET /ossim/session/login.php HTTP/1.1" 200 2612 "- " "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.110 Safari/537.36" [apache.cfg] event_type=event regexp= ((?P<dst>\S+)(:(?P<port>\d{1,5}))? )?(?P<src>\S+) (?P<id>\S+) (?P<user>\S+) \[(?P<date> \d{2}\/\w{3}\/\d{4}:\d{2}:\d{2}:\d{2})\s+[+- ]\d{4}\] \"(?P<request>.*)\ (?P<code>\d{3}) ((?P<size> \d+) - )( \"(?P<referer_uri>.*)\" \ (?P<useragent>.*)\")?$ src_ip={resolv($src)} dst_ip={resolv($dst)} dst_port={$port} date={normalize_date($date)} plugin_sid={$code} username={$user} userdata1={$request} userdata2={$size} userdata3={$referer_uri} userdata4={$useragent} filename={$id}

OSSIM Threat assessment SSH Failed authen8ca8on event SSH successful authen8ca8on event 10 SSH Failed authen8ca8on events Reliability 100 SSH Failed authen8ca8on events SSH successful authen8ca8on event Persistent connec8ons SSH successful authen8ca8on event 1000 SSH Failed authen8ca8on events

OSSIM Risk assessment Source Asset Value = 2 Event Priority = 2 Event Reliability = 10 Des8na8on Asset Value = 5 RISK = (ASSET VALUE * EVENT PRIORITY * EVENT RELIABILITY)/25

OSSIM ALack analysis OTX Alert: Low reputation IP Vulnerability: IIS Remote Command Execution Attacker X.X.X.X Attack Target Y.Y.Y.Y Alert: IIS attack detected Accepted HTTP packet from X.X.X.X to Y.Y.Y.Y Attack: WEB-IIS multiple decode attempt

Why OSSEC Open Source Host- based IDS (HIDS) Log analysis based intrusion detec8on File integrity checking Registry keys integrity checking (Windows only) Signature based malware/rootkits detec)on Real 8me aler)ng and ac8ve response Feeds SIEMs (OSSIM)

OSSEC Architecture OSSEC Agent Logcollectord: Read logs (syslog, wmi, flat files) Syscheckd: File integrity checking Rootcheckd: Malware and rootkits detec8on Agentd: Forwards data to the server OSSEC Server Remoted: Receives data from agents Analysisd: Processes data (main process) Monitord: Monitor agents

OSSEC Integra8on Monitored Host OSSIM Sensor OSSIM Server Logcollector Remoted Analysisd Alerts.log Alarm Syscheckd Rootcheckd Agentd Decode Analyze Monitord Ossec collector Ossim- agent Ossim- server Correla8on Risk assessment Logger OSSEC Agent OSSEC Server OSSIM Agent OSSIM Server

OSSEC Collector Anatomy [ossec.conf] <custom_alert_output>av - Alert - "$TIMESTAMP" - - > RID: "$RULEID"; RL: "$RULELEVEL"; RG: "$RULEGROUP"; RC: "$RULECOMMENT"; USER: "$DSTUSER"; SRCIP: "$SRCIP"; HOSTNAME: "$HOSTNAME"; LOCATION: "$LOCATION"; EVENT: "[INIT]$FULLLOG[END]"; </custom_alert_output> [alerts.log] AV - Alert - "1374721595" - - > RID: "3333"; RL: "7"; RG: "syslog,poscix,service_availability,"; RC: "Poscix stopped."; USER: "None"; SRCIP: "None"; HOSTNAME: "10.0.0.80"; LOCATION: "/var/log/syslog"; EVENT: "[INIT]May 16 14:47:19 10.0.0.80 pos{ix/master[2925]: termina8ng on signal 15[END]"; [ossec- single- line.cfg] event_type=event regexp= ^AV\s- \salert\s- \s\"(?p<date>\d+)\"\s- - >\srid:\s\"(?p<rule_id>\d+)\";\srl:\s\"(?p<rule_level> \d+)\";\srg:\s\"(?p<rule_group>\s+)\";\src:\s\"(?p<rule_comment>.*?)\";\suser:\s\"(?p<username>\s +)\";\ssrcip:\s\"(?p<srcip>.*?)\";\shostname:\s\"\(?(?p<hostname>[a- Za- z0-9_\.]+)\)?[^"]*"; date={normalize_date($date)} plugin_id={translate($rule_id)} plugin_sid={$rule_id} src_ip={resolv($srcip)} dst_ip={resolv($hostname)} username={$username} userdata1={$rule_level} userdata2={$rule_group} userdata3={$rule_comment}

OSSIM Correla8on Rules [AV Bruteforce agack, SSH authen)ca)on agack] Correla8on Engine Alert OSSEC Rule ID Alert Reliability OSSEC Event Type

OSSIM Alarm [AV Bruteforce agack, Windows authen)ca)on agack] Risk Value Correla8on Engine Alerts OSSEC Event

OSSEC Embedded GUI Status monitor Events viewer Agents control manager Configura8on manager Rules viewer/editor Logs viewer Server control manager Deployment manager Rules viewer/editor PDF/HTML Reports

Ques8ons / Demo 8me san8ago@alienvault.com @san8agobassel