How To Use Elasticsearch



Similar documents
Moving Target Reference Implementation

Exploring the Interactions Between Network Data Analysis and Security Information/Event Management

Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon Max Putas

Contracting Officer s Representative (COR) Interactive SharePoint Wiki

Network Analysis with isilk

VoIP in Flow A Beginning

Network Monitoring for Cyber Security

2012 CyberSecurity Watch Survey

$100 SiLK Network Flow Sensor

Applying Software Quality Models to Software Security

A Systematic Method for Big Data Technology Selection

Processing millions of logs with Logstash

Cyber Intelligence Workforce

Abuse of CPE Devices and Recommended Fixes

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013

Monitoring Trends in Network Flow for Situational Awareness

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge

Building Resilient Systems: The Secure Software Development Lifecycle

Using Logstash and Elasticsearch analytics capabilities as a BI tool

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

NetIQ Privileged User Manager

SolarWinds. Packet Analysis Sensor Deployment Guide

Log management with Logstash and Elasticsearch. Matteo Dessalvi

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

Log managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013

simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January

Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory

Heroix Longitude Quick Start Guide V7.1

Goliath Performance Monitor Prerequisites v11.6

Deploying Citrix MetaFrame on IBM eserver BladeCenter with FAStT Storage Planning / Implementation

Information Retrieval Elasticsearch

5nine V2V Easy Converter

Real-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH

Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

Supply-Chain Risk Management Framework

Integrating Symantec Endpoint Protection

Helm 4 Windows Event Viewer

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

SolarWinds Scalability Engine Guidelines for SolarWinds Products Technical Reference

Datasheet FUJITSU Software ServerView Cloud Monitoring Manager V1.0

Architectural Implications of Cloud Computing

Penetration Testing Tools

End Your Data Center Logging Chaos with VMware vcenter Log Insight

CERT Virtual Flow Collection and Analysis

QNAP in vsphere Environment

Assurance Cases for Design Analysis of Complex System of Systems Software

The Key to Successful Monitoring for Detection of Insider Attacks

Integrate Websense Web Security Gateway (WSG)

Monitoring Windows Workstations Seven Important Events

Extending AADL for Security Design Assurance of the Internet of Things

Course Syllabus. Maintaining a Microsoft SQL Server 2005 Database. At Course Completion

Building a logging pipeline with Open Source tools. Iñigo Ortiz de Urbina Cazenave

PANDORA FMS OFFICIAL TRAINING

RSA Security Analytics Security Analytics System Overview

Configuring and Monitoring Event Logs

Configuring Celerra for Security Information Management with Network Intelligence s envision

Using SolarWinds Log and Event Manager (LEM) Filters and Alerts

Configuring and Monitoring SharePoint Servers

Agile Development and Software Architecture: Understanding Scale and Risk

The syslog-ng Store Box 3 F2

Veeam Task Manager for Hyper-V

WHITE PAPER Redefining Monitoring for Today s Modern IT Infrastructures

Improve performance and availability of Banking Portal with HADOOP

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

Elasticsearch on Cisco Unified Computing System: Optimizing your UCS infrastructure for Elasticsearch s analytics software stack

Integrating Juniper Netscreen (ScreenOS)

SolarWinds Technical Reference

Log Insight Manager. Deployment Guide

Integration Module for BMC Remedy Helpdesk

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Maintaining Non-Stop Services with Multi Layer Monitoring

Apache: Analyze Logs for Malicious Activities & Monitor Server Performance

MongoDB Developer and Administrator Certification Course Agenda

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager

Course 55004A: Installing and Configuring System Center 2012 Operations Manager

Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division

Course Syllabus. At Course Completion

PHD Virtual Backup for Hyper-V

Evaluation of Enterprise Data Protection using SEP Software

CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1

Risk Management Framework

Data Collection Agent for Active Directory

55004A: Installing and Configuring System Center 2012 Operations Manager

User Guidance. CimTrak Integrity & Compliance Suite

Acronis Storage Gateway

Transcription:

Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver dsbeaver@cert.org Sean Hutchison shutchison@cert.org January 2015 2014 Carnegie Mellon University

This material is based upon work funded and supported by Department of Homeland Security under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center sponsored by the United States Department of Defense. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution except as restricted below. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. Carnegie Mellon, CERT, CERT Coordination Center and FloCon are registered marks of Carnegie Mellon University. DM-0001883 2

Who are we and what do we do? 3

What s our problem? Small team Lots of users (all untrusted) Lots of systems Lots of logs Luckily, no sensitive information BUT 4

5

Why Elasticsearch Easy to deploy (minimum configuration) Scales vertically and horizontally Easy to use API Modules for most programming/scripting languages Actively developed with good online documentation It s free 6

How Elasticsearch Works in 25 seconds Shards Single instance of Lucene on a node Can be primary or replica Index Mapping of shards to nodes Like a database within a relational database Nodes Keeps a copy of the index Maintain primary and replica shards 7

Hardware and Infrastructure Blades Network attached storage NFS Aggregate TAP, SPAN off switches (physical and virtual) Virtualization (VMware) Puppet 8

Nodes 8 x Nodes virtualized 4x Cores 16 GB ram 500 GB data partition (NFS->NAS) Deployed/Configured using Puppet modules. https://forge.puppetlabs.com/ 9

Software (Data Collection) (Queuing) (Glue/Integration) (Storage, index, search) (Visualization) 10

Data Sources Windows Event Logs Syslog Bro (session data/dpi) SiLK (flow) SNMP PCAP (stored on disk, index information in ES) 11

Can I see a diagram with boxes and arrows? 12

Things we can do Batch analysis (retrospective) Correlation between data sets Make pretty graphs for displaying on TVs Kibana Alerting Python/R 13

Where we want to do Puppet / Applications containers (ie, Docker) Our environment is defined in software. Can we use this to automate auditing? 14

Batch/Retrospective Analysis Say we saw some interesting traffic coming from one of our servers we want to know which processes were run around that time on that host Set a simple filter in Kibana like Kibana queries ES and returns 15

Batch/Retrospective Analysis 16

Batch/Retrospective Analysis You can also use ES Python API to perform queries http://elasticsearch-py.rtfd.org/ Lots of query and filter options; JSON syntax; more flexibility and control Good for Running queries on-demand over any period of time Checking on important events that are too cumbersome to alert on Daily review of logs Investigation 17

Batch/Retrospective Analysis Example query bodies And get 18

Batch/Retrospective Analysis 19

Correlation of Data Sets & Visualization Correlate events within and between data sets to gain context Visualizing data with Kibana facets Makes aspects of data more readily apparent Aids perspective and understanding of data Looks cool Typically Attach one or more Queries to individual facets Drill down on specific data using Filters (whole page) Plethora of info with just one or two filters 20

Correlation of Data Sets & Visualization 21

Correlation of Data Sets & Visualization 22

Alerting Windows Event Monitoring Want to know about certain events as they occur Administrator login Local/SAM account login attempts User account creation/re-enabling Creation/Addition to Groups Scheduled Task creation Log cleared Uses ES Python API and CRON Queries ES 15 times per hour Every 4 minutes -> from : now-4m 23

Alerting Windows Event Monitoring Example Alerts received via email notifications 24

Alerting Windows Event Monitoring Example Alerts received via email notifications 25

Alerting Windows Event Monitoring Example Alerts received via email notifications 26

Alerting Windows Event Monitoring Example Alerts received via email notifications 27

Alerting Irregular Login Activity Want to keep an eye on privileged account use Want to know When users login to hosts they never or rarely ever login to When users login from atypical source IPs When user logins violate certain thresholds based on previous behavior Uses ES Python API, CRON, R, and sqlite3 DB Delivers daily login stats Updates weekly and expires old weeks Checks against DB with 4 weeks of aggregated data 28

Alerting Irregular Login Activity 24 hour stats Processed by R and delivers Daily Login Stats email with plots RSweekly. txt Contains all login activity for the week lin_stats_we ekly.py Processes RSweekly.txt with R, expires old weeks / entries, deduplicate DB 29

Alerting Irregular Login Activity Example Daily Login Stats with plots Email Message 30

Alerting Irregular Login Activity Example Daily Login Stats with plots 31

Alerting Irregular Login Activity Example Daily Login Stats with plots 32

Alerting Irregular Login Activity Example Daily Login Stats with plots 33

Alerting Irregular Login Activity Example Alerts received via email notification 34

Questions and Discussion 2014 Carnegie Mellon University