Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system.
It provides OSSIM-style correlation for normalized logs/events, perform lookup/query to threat intelligence and vulnerability information sources, and produces risk-adjusted alarms.
Features
Also Read – Attack Range : Tool To Simulate Attacks Against & Collect Data Into Splunk
How It Works?
On the diagram above:
suricata-*
for logs received from Suricata IDS, ssh-*
for SSH logs, etc.). siem_events-*
. The final result of the above processes is that now we can watch for new alarms and updates to an existing one just by monitoring a single Elasticsearch index.
Installation
The quickest and most reliable way to test Dsiem is to use the supplied Docker Compose files. They include Dsiem, all the required ELK stack, and an example log source (Suricata) pre-configured.
Then after you get a feel on how everything fits together, you can start integrating Dsiem into your existing or custom ELK deployment.
Installing Dsiem
Using Docker Compose
$ unzip dsiem-master.zip && cd dsiem-master
bash
shell): $ export PROMISC_INTERFACE=eth0
eth0
above with the actual interface name given by ifconfig
or similar commands. For testing purpose, it’s not necessary to configure the interface to really operate in promiscuous mode. $ cd deployments/docker && \
sudo chown root $(find conf/filebeat/ conf/filebeat-es/ -name “*.yml”)
$ docker-compose pull
$ docker-compose up
docker-compose
: EXTERNAL_NET: "any"
, so you can easily trigger a test alarm just by continuously pinging a host in the same subnet. Dsiem comes with an example directive configuration that will intercept this “attack”.siem_events-*
, and alarms will be in siem_alarms
. You can view their content from Kibana or Dsiem web UI. Importing Kibana Dashboard
$ ./scripts/kbndashboard-import.sh localhost ./deployments/kibana/dashboard-siem.json
siem_alarms
and siem_events-*
) to have been created before it can be accessed without error. This means you will need to trigger the test alarm described above before attempting to use the dashboard. Using Existing ELK
/var/dsiem
: # [ “$EUID” -ne 0 ] && echo must be run as root! || (\
export DSIEM_DIR=/var/dsiem && \
mkdir -p $DSIEM_DIR && \
wget https://github.com/defenxor/dsiem/releases/latest/download/dsiem-server_linux_amd64.zip -O /tmp/dsiem.zip && \
unzip /tmp/dsiem.zip -d $DSIEM_DIR && rm -rf /tmp/dsiem.zip && \
cd $DSIEM_DIR
/var/dsiem/web/dist/assets/config/esconfig.json
: $ cat esconfig.json
{
“elasticsearch”: “http://elasticsearch:9200”,
“kibana”: “http://kibana:5601”
}
/var/log/dsiem
in that example to the logs
directory inside dsiem install location (/var/dsiem/logs
if using the above example). filebeat.yml
file to point to your Logstash endpoint address. # [ “$EUID” -ne 0 ] && echo must be run as root! || ( \
cat <<EOF > /etc/systemd/system/dsiem.service
[Unit]
Description=Dsiem
After=network.target
[Service]
Type=simple
WorkingDirectory=/var/dsiem
ExecStart=/var/dsiem/dsiem serve
Restart=on-failure
[Install]
WantedBy=multi-user.target
EOF
systemctl daemon-reload && \
systemctl enable dsiem.service && \
systemctl start dsiem.service && \
systemctl status dsiem.service)
deployments/kibana/dashboard-siem.json
. This step will also install all Kibana index-patterns (siem_alarms
and siem_events
) that will be linked to from Dsiem web UI. $ ./scripts/kbndashboard-import.sh ${your-kibana-IP-or-hostname} ./deployments/kibana/dashboard-siem.json Uninstalling Dsiem
For docker-compose
installation, just run the following:
$ cd dsiem/deployments/docker && \
docker-compose down -v
or
$ cd dsiem/deployments/docker && \
docker-compose -f docker-compose-cluster.yml down -v
For non docker-compose
procedure, you will have to undo all the changes made manually, for example:
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…