Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system.
It provides OSSIM-style correlation for normalized logs/events, perform lookup/query to threat intelligence and vulnerability information sources, and produces risk-adjusted alarms.
Features
Also Read – Attack Range : Tool To Simulate Attacks Against & Collect Data Into Splunk
How It Works?
On the diagram above:
suricata-*
for logs received from Suricata IDS, ssh-*
for SSH logs, etc.). siem_events-*
. The final result of the above processes is that now we can watch for new alarms and updates to an existing one just by monitoring a single Elasticsearch index.
Installation
The quickest and most reliable way to test Dsiem is to use the supplied Docker Compose files. They include Dsiem, all the required ELK stack, and an example log source (Suricata) pre-configured.
Then after you get a feel on how everything fits together, you can start integrating Dsiem into your existing or custom ELK deployment.
Installing Dsiem
Using Docker Compose
$ unzip dsiem-master.zip && cd dsiem-master
bash
shell): $ export PROMISC_INTERFACE=eth0
eth0
above with the actual interface name given by ifconfig
or similar commands. For testing purpose, it’s not necessary to configure the interface to really operate in promiscuous mode. $ cd deployments/docker && \
sudo chown root $(find conf/filebeat/ conf/filebeat-es/ -name “*.yml”)
$ docker-compose pull
$ docker-compose up
docker-compose
: EXTERNAL_NET: "any"
, so you can easily trigger a test alarm just by continuously pinging a host in the same subnet. Dsiem comes with an example directive configuration that will intercept this “attack”.siem_events-*
, and alarms will be in siem_alarms
. You can view their content from Kibana or Dsiem web UI. Importing Kibana Dashboard
$ ./scripts/kbndashboard-import.sh localhost ./deployments/kibana/dashboard-siem.json
siem_alarms
and siem_events-*
) to have been created before it can be accessed without error. This means you will need to trigger the test alarm described above before attempting to use the dashboard. Using Existing ELK
/var/dsiem
: # [ “$EUID” -ne 0 ] && echo must be run as root! || (\
export DSIEM_DIR=/var/dsiem && \
mkdir -p $DSIEM_DIR && \
wget https://github.com/defenxor/dsiem/releases/latest/download/dsiem-server_linux_amd64.zip -O /tmp/dsiem.zip && \
unzip /tmp/dsiem.zip -d $DSIEM_DIR && rm -rf /tmp/dsiem.zip && \
cd $DSIEM_DIR
/var/dsiem/web/dist/assets/config/esconfig.json
: $ cat esconfig.json
{
“elasticsearch”: “http://elasticsearch:9200”,
“kibana”: “http://kibana:5601”
}
/var/log/dsiem
in that example to the logs
directory inside dsiem install location (/var/dsiem/logs
if using the above example). filebeat.yml
file to point to your Logstash endpoint address. # [ “$EUID” -ne 0 ] && echo must be run as root! || ( \
cat <<EOF > /etc/systemd/system/dsiem.service
[Unit]
Description=Dsiem
After=network.target
[Service]
Type=simple
WorkingDirectory=/var/dsiem
ExecStart=/var/dsiem/dsiem serve
Restart=on-failure
[Install]
WantedBy=multi-user.target
EOF
systemctl daemon-reload && \
systemctl enable dsiem.service && \
systemctl start dsiem.service && \
systemctl status dsiem.service)
deployments/kibana/dashboard-siem.json
. This step will also install all Kibana index-patterns (siem_alarms
and siem_events
) that will be linked to from Dsiem web UI. $ ./scripts/kbndashboard-import.sh ${your-kibana-IP-or-hostname} ./deployments/kibana/dashboard-siem.json Uninstalling Dsiem
For docker-compose
installation, just run the following:
$ cd dsiem/deployments/docker && \
docker-compose down -v
or
$ cd dsiem/deployments/docker && \
docker-compose -f docker-compose-cluster.yml down -v
For non docker-compose
procedure, you will have to undo all the changes made manually, for example:
WID_LoadLibrary is a custom implementation inspired by the Windows API function LoadLibrary, which is used…
Locksmith is a specialized tool designed to identify and remediate vulnerabilities in Active Directory Certificate…
Uscrapper Vanta is a powerful open-source intelligence (OSINT) tool designed to revolutionize web scraping and…
Pake is an innovative tool designed to convert any webpage into a desktop application with…
Bevy is an open-source, data-driven game engine built in Rust, designed to simplify game development…
AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user…