SlideShare a Scribd company logo
Contents
Contents
 Practical Monitoring with OSSIM
 Asset and Data Source Identification
 OSSIM Platform
 OSSIM Architecture
 Minimum Requirements
 Create OTX Account
 Factors to Consider
 Demo Environment
 OSSIM Installation
 Basic Configuration
 AddingAssets & ConfiguringVA
 IDS in OSSIM
 Setting up HIDS
 Setting up NIDS
 Adding Devices Enabling Plugins
 Plugins for CheckPoint Firewall
 Availability Monitoring
Practical Monitoring with OSSIM
 Cyber security is a challenge.
 24 x 7 monitoring of critical networks.
 OSSIM is a open source product.
 PEOPLE PROCESSTECHNOLOGY
 Strengths and weaknesses of OSSIM tool.
Asset and data source Identification
 Asset –any device with an IP address.
 Data Source – Assets Capable of creating and sending logs.
 OSSIM support logs from databases, syslogs andWMI etc.
OSSIM Platform
 Asset Discovery
 Active Network Scanning
 Passive Network Scanning
 Asset Inventory
 VulnerabilityAssessment
 ContinuousVulnerability Monitoring
 Authenticated Unauthenticated Active Scan
 Threat Detection
 Network IDS
 Host IDS
 File Integrity Monitoring
 Behavioral Monitoring
 NetFlow Analysis
 Service Availability Monitoring
 Security Intelligence
 Log Collection
 Event Correlation
 Incident Response
OSSIM Architecture
 Sensor
 Asset Discovery
 Vulnerability Scanning
 Event Collection
 Server
 Policy
 RiskAssessment
 Correlation
 SQL Storage
 Forwarding
 Logger
 Log Storage for OSSIM
 Digitally Signed long term Storage
Minimum Requirements
 Hardware requirement
 8 CPU cores
 16 Gb RAM
 1TB of HDD
 3 Network Interfaces
 Additional requirement
 VMware or Hyper-V
 OSSIM ISO file
 OTX key (I’ll guide you on how to get it)
Create OTX Account
Factors to Consider
Before the implementation of OSSIM it is necessary to check on the following areas.
 EPS (Events Per Seconds)
 Numbers of Assets
 Bandwidth
 Geographical locations
 Network Boundaries
 Time zones
 Storage
Demo Environment
OSSIM
Installation
Getting Started Wizard – Network
Interfaces
Basic Configuration
 Setting up the correct time zone
 Configuring hostname
 Setting up the correct time zone for the user
 Configuring password for the configuration backup
Adding Assets & Configuring VA
 Any device with an IP address is an asset.
 Examples :-
 Firewalls
 servers
 IP cameras
 mobile device
 network printers
IDS in OSSIM
 HIDS – Host base intrusion detection system
 NIDS – network base intrusion detection system
IDS
HIDS NIDS
Setting up HIDS
 What is HIDS?
Host base intrusion detection system means put the agent to the
device and pull the device logs to the OSSIM and do the Correlations
part inside the OSSIM and generate the alarms.
 Ossec
 Nxlog
 File beat
Setting up NIDS
Network base intrusion detections means it’s analyzed in and out
network traffic in the environment and analyzed the behavior of the
traffic generated. OSSIM is doing those part with out agent that’s
why it called NIDS.
Adding devices and Enabling Plugins
Next we’re going to integrate devices that send syslogs. So first ask
your network admin to forward syslogs towards UDP port 514 of the
log collector IP of OSSIM
DEMO
Create Plugins
Plugins for CheckPoint firewall
 What is a plugin?
 OSSIM has nearly 1000 plugins for different devices
 For Example “Fw1.alt” is the plugin for CheckPoint
Fw1.alt Plugin
Creating a plugin
 Regular Expressions
 Regular Expressions – Combinations
 Regular Expressions — Occurrence Matches
 Regular Expressions — Complex Matches
 Regular Expressions — Special Characters
Regular Expressions
Operator Meaning
c A non special character matches itself
c Adds the special meaning of the character c; The $ matches with $
^ Indicates the position at the beginning of the line
$ Indicates the position at the end of the line
. Any individual character
[…] One or any of the characters …; accepts intervals of the type a-z, 0-9, A-Z
[^…] A character different from … ; accepts intervals of the type a-z, 0-9, A-Z
Regular Expressions - Combinations
Regular expression Matches with
a.b axb aab abb aSb a#b ...
a..b axxb aaab abbb a4$b ...
[abc] a b c (one character strings)
[aA] a (one character strings)
[aA][bB] ab aB AB (two character strings)
[0123456789] 0 1 2 3 4 5 6 7 8 9
[0-9] 0 1 2 3 4 5 6 7 8 9
[A-Za-z] A B C ... Z a b c ... z
[0-9][0-9][0-9] 000 001 .. 009 010 .. 019 100 .. 999
Regular Expressions — Occurrence
MatchesOperator Meaning
r* 0 or more occurrences of r
r+ 1 or more occurrences of r
r? 0 or 1 occurrence of r, and no more
r{n} n occurrences of r
r{,m} 0 or at most m occurrences of r
r{n,m} n or more occurrences of r, but at most m
r1|r2 r1 or r2
Regular Expressions — Special Characters
Regular expression Matches with Equals
d Any decimal character [0-9]
D Any non-decimal character [^0-9]
s Any space character [ tnrfv]
S Any non-space character [^ tnrfv]
w
Any alphanumeric character
and “_”
[a-zA-Z0-9_]
W Any non-alphanumeric character [^a-zA-Z0-9_]
Z End of line
Regular Expressions — Complex Matches
Regular expression Matches with
[0-9]+ 0 1 9 00 99 123 456 999 9999 99999 99999999 ..
[0-9]? empty_string 0 1 2 .. 9
(ab)* empty_string ab ababab abababababab
([0-9]+ab)* empty_string 1234ab 9ab9ab9ab 9876543210ab 99ab99ab ...
Create a Simple Correlation
 Logical correlation uses correlation directives to detect attacks.
 By default, OSSIM includes almost 80 built-in directives.
 Users can customize existing directives or create custom ones.
Availability Monitoring
The last option to enable in OSSIM will be the Availability monitoring.
As the word means, it simply checks whether the resource/service is
available or not.
 Service Available Monitoring
 Device Available Monitoring
Understanding the Dashboard
THANK
YOU
FOLLOW US ON
/econIntconference @econ_int @int.econ

More Related Content

What's hot

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
hardik soni
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
EDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptxEDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptx
SMIT PAREKH
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
AlienVault
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
SandeshUprety4
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
OWASP Delhi
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
Sagar Joshi
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
Camilo Fandiño Gómez
 
Siem ppt
Siem pptSiem ppt
Siem ppt
kmehul
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVault
AlienVault
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
hashnees
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
Coenraad Smith
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
SHRIYARAI4
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
Avishek Priyadarshi
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)
Osama Ellahi
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
Pituphong Yavirach
 

What's hot (20)

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
EDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptxEDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptx
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVault
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 

Similar to Continuous monitoring with OSSIM

Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Amazon Web Services
 
Secure Programming
Secure ProgrammingSecure Programming
Secure Programming
alpha0
 
Best Practices of IoT in the Cloud
Best Practices of IoT in the CloudBest Practices of IoT in the Cloud
Best Practices of IoT in the Cloud
Amazon Web Services
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
Amazon Web Services
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
Amazon Web Services
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
iPhone Lecture #1
iPhone Lecture #1iPhone Lecture #1
iPhone Lecture #1Jaehyeuk Oh
 
Cluj JSHeroes 2017 - Liran Tal on Node.js Security
Cluj JSHeroes 2017 - Liran Tal on Node.js SecurityCluj JSHeroes 2017 - Liran Tal on Node.js Security
Cluj JSHeroes 2017 - Liran Tal on Node.js Security
Liran Tal
 
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor WSO2
 
Complex Event Processor 3.0.0 - An overview of upcoming features
Complex Event Processor 3.0.0 - An overview of upcoming features Complex Event Processor 3.0.0 - An overview of upcoming features
Complex Event Processor 3.0.0 - An overview of upcoming features WSO2
 
DEF CON 27 - AMIT WAISEL and HILA COHEN - malproxy
DEF CON 27 - AMIT WAISEL and HILA COHEN - malproxyDEF CON 27 - AMIT WAISEL and HILA COHEN - malproxy
DEF CON 27 - AMIT WAISEL and HILA COHEN - malproxy
Felipe Prado
 
AWS Summit Tel Aviv - Startup Track - Continuous Deployment
AWS Summit Tel Aviv - Startup Track - Continuous DeploymentAWS Summit Tel Aviv - Startup Track - Continuous Deployment
AWS Summit Tel Aviv - Startup Track - Continuous DeploymentAmazon Web Services
 
GuardDuty Hands-on Lab
GuardDuty Hands-on LabGuardDuty Hands-on Lab
GuardDuty Hands-on Lab
Amazon Web Services
 
SEC303 Automating Security in Cloud Workloads with DevSecOps
SEC303 Automating Security in Cloud Workloads with DevSecOpsSEC303 Automating Security in Cloud Workloads with DevSecOps
SEC303 Automating Security in Cloud Workloads with DevSecOps
Amazon Web Services
 
Aws + Puppet = Dynamic Scale
Aws + Puppet = Dynamic ScaleAws + Puppet = Dynamic Scale
Aws + Puppet = Dynamic Scale
Puppet
 
Powershell Tech Ed2009
Powershell Tech Ed2009Powershell Tech Ed2009
Powershell Tech Ed2009rsnarayanan
 
Integrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdfIntegrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdf
Amazon Web Services
 
(ENT212) How Autodesk Leverages Splunk as an Assurance Platform on AWS | AWS ...
(ENT212) How Autodesk Leverages Splunk as an Assurance Platform on AWS | AWS ...(ENT212) How Autodesk Leverages Splunk as an Assurance Platform on AWS | AWS ...
(ENT212) How Autodesk Leverages Splunk as an Assurance Platform on AWS | AWS ...
Amazon Web Services
 

Similar to Continuous monitoring with OSSIM (20)

Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
Automating Security and Compliance Testing of Infrastructure-as-Code for DevS...
 
Secure Programming
Secure ProgrammingSecure Programming
Secure Programming
 
Best Practices of IoT in the Cloud
Best Practices of IoT in the CloudBest Practices of IoT in the Cloud
Best Practices of IoT in the Cloud
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
iPhone Lecture #1
iPhone Lecture #1iPhone Lecture #1
iPhone Lecture #1
 
Cluj JSHeroes 2017 - Liran Tal on Node.js Security
Cluj JSHeroes 2017 - Liran Tal on Node.js SecurityCluj JSHeroes 2017 - Liran Tal on Node.js Security
Cluj JSHeroes 2017 - Liran Tal on Node.js Security
 
Ruby voip
Ruby voipRuby voip
Ruby voip
 
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
WSO2 Product Release Webinar - Introducing the WSO2 Complex Event Processor
 
Complex Event Processor 3.0.0 - An overview of upcoming features
Complex Event Processor 3.0.0 - An overview of upcoming features Complex Event Processor 3.0.0 - An overview of upcoming features
Complex Event Processor 3.0.0 - An overview of upcoming features
 
DEF CON 27 - AMIT WAISEL and HILA COHEN - malproxy
DEF CON 27 - AMIT WAISEL and HILA COHEN - malproxyDEF CON 27 - AMIT WAISEL and HILA COHEN - malproxy
DEF CON 27 - AMIT WAISEL and HILA COHEN - malproxy
 
AWS Summit Tel Aviv - Startup Track - Continuous Deployment
AWS Summit Tel Aviv - Startup Track - Continuous DeploymentAWS Summit Tel Aviv - Startup Track - Continuous Deployment
AWS Summit Tel Aviv - Startup Track - Continuous Deployment
 
GuardDuty Hands-on Lab
GuardDuty Hands-on LabGuardDuty Hands-on Lab
GuardDuty Hands-on Lab
 
SEC303 Automating Security in Cloud Workloads with DevSecOps
SEC303 Automating Security in Cloud Workloads with DevSecOpsSEC303 Automating Security in Cloud Workloads with DevSecOps
SEC303 Automating Security in Cloud Workloads with DevSecOps
 
Aws + Puppet = Dynamic Scale
Aws + Puppet = Dynamic ScaleAws + Puppet = Dynamic Scale
Aws + Puppet = Dynamic Scale
 
Powershell Tech Ed2009
Powershell Tech Ed2009Powershell Tech Ed2009
Powershell Tech Ed2009
 
Integrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdfIntegrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdf
 
(ENT212) How Autodesk Leverages Splunk as an Assurance Platform on AWS | AWS ...
(ENT212) How Autodesk Leverages Splunk as an Assurance Platform on AWS | AWS ...(ENT212) How Autodesk Leverages Splunk as an Assurance Platform on AWS | AWS ...
(ENT212) How Autodesk Leverages Splunk as an Assurance Platform on AWS | AWS ...
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Continuous monitoring with OSSIM

  • 1.
  • 2.
  • 4. Contents  Practical Monitoring with OSSIM  Asset and Data Source Identification  OSSIM Platform  OSSIM Architecture  Minimum Requirements  Create OTX Account  Factors to Consider  Demo Environment  OSSIM Installation  Basic Configuration  AddingAssets & ConfiguringVA  IDS in OSSIM  Setting up HIDS  Setting up NIDS  Adding Devices Enabling Plugins  Plugins for CheckPoint Firewall  Availability Monitoring
  • 5. Practical Monitoring with OSSIM  Cyber security is a challenge.  24 x 7 monitoring of critical networks.  OSSIM is a open source product.  PEOPLE PROCESSTECHNOLOGY  Strengths and weaknesses of OSSIM tool.
  • 6. Asset and data source Identification  Asset –any device with an IP address.  Data Source – Assets Capable of creating and sending logs.  OSSIM support logs from databases, syslogs andWMI etc.
  • 7. OSSIM Platform  Asset Discovery  Active Network Scanning  Passive Network Scanning  Asset Inventory  VulnerabilityAssessment  ContinuousVulnerability Monitoring  Authenticated Unauthenticated Active Scan  Threat Detection  Network IDS  Host IDS  File Integrity Monitoring  Behavioral Monitoring  NetFlow Analysis  Service Availability Monitoring  Security Intelligence  Log Collection  Event Correlation  Incident Response
  • 8. OSSIM Architecture  Sensor  Asset Discovery  Vulnerability Scanning  Event Collection  Server  Policy  RiskAssessment  Correlation  SQL Storage  Forwarding  Logger  Log Storage for OSSIM  Digitally Signed long term Storage
  • 9. Minimum Requirements  Hardware requirement  8 CPU cores  16 Gb RAM  1TB of HDD  3 Network Interfaces  Additional requirement  VMware or Hyper-V  OSSIM ISO file  OTX key (I’ll guide you on how to get it)
  • 11. Factors to Consider Before the implementation of OSSIM it is necessary to check on the following areas.  EPS (Events Per Seconds)  Numbers of Assets  Bandwidth  Geographical locations  Network Boundaries  Time zones  Storage
  • 14. Getting Started Wizard – Network Interfaces
  • 15. Basic Configuration  Setting up the correct time zone  Configuring hostname  Setting up the correct time zone for the user  Configuring password for the configuration backup
  • 16. Adding Assets & Configuring VA  Any device with an IP address is an asset.  Examples :-  Firewalls  servers  IP cameras  mobile device  network printers
  • 17. IDS in OSSIM  HIDS – Host base intrusion detection system  NIDS – network base intrusion detection system IDS HIDS NIDS
  • 18. Setting up HIDS  What is HIDS? Host base intrusion detection system means put the agent to the device and pull the device logs to the OSSIM and do the Correlations part inside the OSSIM and generate the alarms.  Ossec  Nxlog  File beat
  • 19. Setting up NIDS Network base intrusion detections means it’s analyzed in and out network traffic in the environment and analyzed the behavior of the traffic generated. OSSIM is doing those part with out agent that’s why it called NIDS.
  • 20. Adding devices and Enabling Plugins Next we’re going to integrate devices that send syslogs. So first ask your network admin to forward syslogs towards UDP port 514 of the log collector IP of OSSIM
  • 21. DEMO
  • 23. Plugins for CheckPoint firewall  What is a plugin?  OSSIM has nearly 1000 plugins for different devices  For Example “Fw1.alt” is the plugin for CheckPoint
  • 25. Creating a plugin  Regular Expressions  Regular Expressions – Combinations  Regular Expressions — Occurrence Matches  Regular Expressions — Complex Matches  Regular Expressions — Special Characters
  • 26. Regular Expressions Operator Meaning c A non special character matches itself c Adds the special meaning of the character c; The $ matches with $ ^ Indicates the position at the beginning of the line $ Indicates the position at the end of the line . Any individual character […] One or any of the characters …; accepts intervals of the type a-z, 0-9, A-Z [^…] A character different from … ; accepts intervals of the type a-z, 0-9, A-Z
  • 27. Regular Expressions - Combinations Regular expression Matches with a.b axb aab abb aSb a#b ... a..b axxb aaab abbb a4$b ... [abc] a b c (one character strings) [aA] a (one character strings) [aA][bB] ab aB AB (two character strings) [0123456789] 0 1 2 3 4 5 6 7 8 9 [0-9] 0 1 2 3 4 5 6 7 8 9 [A-Za-z] A B C ... Z a b c ... z [0-9][0-9][0-9] 000 001 .. 009 010 .. 019 100 .. 999
  • 28. Regular Expressions — Occurrence MatchesOperator Meaning r* 0 or more occurrences of r r+ 1 or more occurrences of r r? 0 or 1 occurrence of r, and no more r{n} n occurrences of r r{,m} 0 or at most m occurrences of r r{n,m} n or more occurrences of r, but at most m r1|r2 r1 or r2
  • 29. Regular Expressions — Special Characters Regular expression Matches with Equals d Any decimal character [0-9] D Any non-decimal character [^0-9] s Any space character [ tnrfv] S Any non-space character [^ tnrfv] w Any alphanumeric character and “_” [a-zA-Z0-9_] W Any non-alphanumeric character [^a-zA-Z0-9_] Z End of line
  • 30. Regular Expressions — Complex Matches Regular expression Matches with [0-9]+ 0 1 9 00 99 123 456 999 9999 99999 99999999 .. [0-9]? empty_string 0 1 2 .. 9 (ab)* empty_string ab ababab abababababab ([0-9]+ab)* empty_string 1234ab 9ab9ab9ab 9876543210ab 99ab99ab ...
  • 31. Create a Simple Correlation  Logical correlation uses correlation directives to detect attacks.  By default, OSSIM includes almost 80 built-in directives.  Users can customize existing directives or create custom ones.
  • 32. Availability Monitoring The last option to enable in OSSIM will be the Availability monitoring. As the word means, it simply checks whether the resource/service is available or not.  Service Available Monitoring  Device Available Monitoring
  • 35. FOLLOW US ON /econIntconference @econ_int @int.econ

Editor's Notes

  1. I have been working soc analyst in past year and did
  2. Cyber security is the key challenge for any kind or any size of a company . Because of the rapid development of new technology There are multiple solutions to overcome this challenge. But when considering effectiveness of these solutions, Security operating center or we simply called SOC, leads the industry, with it’s continues monitoring capability. You know when it’s come to soc people believe it as an expensive solution . But to overcome this any one can go for an open solutions So let me introduce you a world recognize open source tool with many useful features Cyber security is a challenge for many organization today. Rapid Changes in the threat landscape forces many organizations to adopt expensive security solutions even when the organizations is not ready for such solution. Establishing an organization wide security operation center (SOC) is perceived as a solution to meet the challenges of cyber security by introducing 24 x 7 monitoring of critical networks. OSSIM is a open source product with many useful features that will allow you to take the first steps towards establishing a SOC. It will also allow you to adopt PEOPLE PROCESS TECHNOLOGY approach for your cyber security solution. It is important to understand the strengths and weaknesses of OSSIM tool.
  3. Anything that has any IP address can be declared as an Asset. If those assets are capable of creating and sending any type of logs in to an SIEM, then it is a data source. OSSIM support logs from databases, syslogs and WMI etc. In addition to that we also forward a copy of the network traffic (SPAN) towards OSSIM. I’ve seen some Antivirus engines do not support syslogs , but it dumps it’s events in local database. In such cases we configure the OSSIM to manually login to those databases and fetch logs at regular intervals.
  4. Anything that has any IP address can be declared as an Asset. If those assets are capable of creating and sending any type of logs in to an SIEM, then it is a data source. OSSIM support logs from databases, syslogs and WMI etc. In addition to that we also forward a copy of the network traffic (SPAN) towards OSSIM. I’ve seen some Antivirus engines do not support syslogs , but it dumps it’s events in local database. In such cases we configure the OSSIM to manually login to those databases and fetch logs at regular intervals.
  5. Anything that has any IP address can be declared as an Asset. If those assets are capable of creating and sending any type of logs in to an SIEM, then it is a data source. OSSIM support logs from databases, syslogs and WMI etc. In addition to that we also forward a copy of the network traffic (SPAN) towards OSSIM. I’ve seen some Antivirus engines do not support syslogs , but it dumps it’s events in local database. In such cases we configure the OSSIM to manually login to those databases and fetch logs at regular intervals.
  6. To perform the basic ossime functionality these are the requirement
  7. Anything that has any IP address can be declared as an Asset. If those assets are capable of creating and sending any type of logs in to an SIEM, then it is a data source. OSSIM support logs from databases, syslogs and WMI etc. In addition to that we also forward a copy of the network traffic (SPAN) towards OSSIM. I’ve seen some Antivirus engines do not support syslogs , but it dumps it’s events in local database. In such cases we configure the OSSIM to manually login to those databases and fetch logs at regular intervals.
  8. Anything that has any IP address can be declared as an Asset. If those assets are capable of creating and sending any type of logs in to an SIEM, then it is a data source. OSSIM support logs from databases, syslogs and WMI etc. In addition to that we also forward a copy of the network traffic (SPAN) towards OSSIM. I’ve seen some Antivirus engines do not support syslogs , but it dumps it’s events in local database. In such cases we configure the OSSIM to manually login to those databases and fetch logs at regular intervals.
  9. Anything that has any IP address can be declared as an Asset. If those assets are capable of creating and sending any type of logs in to an SIEM, then it is a data source. OSSIM support logs from databases, syslogs and WMI etc. In addition to that we also forward a copy of the network traffic (SPAN) towards OSSIM. I’ve seen some Antivirus engines do not support syslogs , but it dumps it’s events in local database. In such cases we configure the OSSIM to manually login to those databases and fetch logs at regular intervals.
  10. Anything that has any IP address can be declared as an Asset. If those assets are capable of creating and sending any type of logs in to an SIEM, then it is a data source. OSSIM support logs from databases, syslogs and WMI etc. In addition to that we also forward a copy of the network traffic (SPAN) towards OSSIM. I’ve seen some Antivirus engines do not support syslogs , but it dumps it’s events in local database. In such cases we configure the OSSIM to manually login to those databases and fetch logs at regular intervals.
  11. Any body know what is plugin?
  12. Let’s move to the simple correlation
  13. I’ll show simple dashboard and let’s try to understand it