Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system.
It provides OSSIM-style correlation for normalized logs/events, perform lookup/query to threat intelligence and vulnerability information sources, and produces risk-adjusted alarms.
Features
Also Read – Attack Range : Tool To Simulate Attacks Against & Collect Data Into Splunk
How It Works?
On the diagram above:
suricata-*
for logs received from Suricata IDS, ssh-*
for SSH logs, etc.). siem_events-*
. The final result of the above processes is that now we can watch for new alarms and updates to an existing one just by monitoring a single Elasticsearch index.
Installation
The quickest and most reliable way to test Dsiem is to use the supplied Docker Compose files. They include Dsiem, all the required ELK stack, and an example log source (Suricata) pre-configured.
Then after you get a feel on how everything fits together, you can start integrating Dsiem into your existing or custom ELK deployment.
Installing Dsiem
Using Docker Compose
$ unzip dsiem-master.zip && cd dsiem-master
bash
shell): $ export PROMISC_INTERFACE=eth0
eth0
above with the actual interface name given by ifconfig
or similar commands. For testing purpose, it’s not necessary to configure the interface to really operate in promiscuous mode. $ cd deployments/docker && \
sudo chown root $(find conf/filebeat/ conf/filebeat-es/ -name “*.yml”)
$ docker-compose pull
$ docker-compose up
docker-compose
: EXTERNAL_NET: "any"
, so you can easily trigger a test alarm just by continuously pinging a host in the same subnet. Dsiem comes with an example directive configuration that will intercept this “attack”.siem_events-*
, and alarms will be in siem_alarms
. You can view their content from Kibana or Dsiem web UI. Importing Kibana Dashboard
$ ./scripts/kbndashboard-import.sh localhost ./deployments/kibana/dashboard-siem.json
siem_alarms
and siem_events-*
) to have been created before it can be accessed without error. This means you will need to trigger the test alarm described above before attempting to use the dashboard. Using Existing ELK
/var/dsiem
: # [ “$EUID” -ne 0 ] && echo must be run as root! || (\
export DSIEM_DIR=/var/dsiem && \
mkdir -p $DSIEM_DIR && \
wget https://github.com/defenxor/dsiem/releases/latest/download/dsiem-server_linux_amd64.zip -O /tmp/dsiem.zip && \
unzip /tmp/dsiem.zip -d $DSIEM_DIR && rm -rf /tmp/dsiem.zip && \
cd $DSIEM_DIR
/var/dsiem/web/dist/assets/config/esconfig.json
: $ cat esconfig.json
{
“elasticsearch”: “http://elasticsearch:9200”,
“kibana”: “http://kibana:5601”
}
/var/log/dsiem
in that example to the logs
directory inside dsiem install location (/var/dsiem/logs
if using the above example). filebeat.yml
file to point to your Logstash endpoint address. # [ “$EUID” -ne 0 ] && echo must be run as root! || ( \
cat <<EOF > /etc/systemd/system/dsiem.service
[Unit]
Description=Dsiem
After=network.target
[Service]
Type=simple
WorkingDirectory=/var/dsiem
ExecStart=/var/dsiem/dsiem serve
Restart=on-failure
[Install]
WantedBy=multi-user.target
EOF
systemctl daemon-reload && \
systemctl enable dsiem.service && \
systemctl start dsiem.service && \
systemctl status dsiem.service)
deployments/kibana/dashboard-siem.json
. This step will also install all Kibana index-patterns (siem_alarms
and siem_events
) that will be linked to from Dsiem web UI. $ ./scripts/kbndashboard-import.sh ${your-kibana-IP-or-hostname} ./deployments/kibana/dashboard-siem.json Uninstalling Dsiem
For docker-compose
installation, just run the following:
$ cd dsiem/deployments/docker && \
docker-compose down -v
or
$ cd dsiem/deployments/docker && \
docker-compose -f docker-compose-cluster.yml down -v
For non docker-compose
procedure, you will have to undo all the changes made manually, for example:
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…