Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system.
It provides OSSIM-style correlation for normalized logs/events, perform lookup/query to threat intelligence and vulnerability information sources, and produces risk-adjusted alarms.
Features
Also Read – Attack Range : Tool To Simulate Attacks Against & Collect Data Into Splunk
How It Works?
On the diagram above:
suricata-* for logs received from Suricata IDS, ssh-* for SSH logs, etc.). siem_events-*. The final result of the above processes is that now we can watch for new alarms and updates to an existing one just by monitoring a single Elasticsearch index.
Installation
The quickest and most reliable way to test Dsiem is to use the supplied Docker Compose files. They include Dsiem, all the required ELK stack, and an example log source (Suricata) pre-configured.
Then after you get a feel on how everything fits together, you can start integrating Dsiem into your existing or custom ELK deployment.
Installing Dsiem
Using Docker Compose
$ unzip dsiem-master.zip && cd dsiem-master
bash shell): $ export PROMISC_INTERFACE=eth0
eth0 above with the actual interface name given by ifconfig or similar commands. For testing purpose, it’s not necessary to configure the interface to really operate in promiscuous mode. $ cd deployments/docker && \
sudo chown root $(find conf/filebeat/ conf/filebeat-es/ -name “*.yml”)
$ docker-compose pull
$ docker-compose up
docker-compose: EXTERNAL_NET: "any", so you can easily trigger a test alarm just by continuously pinging a host in the same subnet. Dsiem comes with an example directive configuration that will intercept this “attack”.siem_events-*, and alarms will be in siem_alarms. You can view their content from Kibana or Dsiem web UI. Importing Kibana Dashboard
$ ./scripts/kbndashboard-import.sh localhost ./deployments/kibana/dashboard-siem.json
siem_alarms and siem_events-*) to have been created before it can be accessed without error. This means you will need to trigger the test alarm described above before attempting to use the dashboard. Using Existing ELK
/var/dsiem: # [ “$EUID” -ne 0 ] && echo must be run as root! || (\
export DSIEM_DIR=/var/dsiem && \
mkdir -p $DSIEM_DIR && \
wget https://github.com/defenxor/dsiem/releases/latest/download/dsiem-server_linux_amd64.zip -O /tmp/dsiem.zip && \
unzip /tmp/dsiem.zip -d $DSIEM_DIR && rm -rf /tmp/dsiem.zip && \
cd $DSIEM_DIR
/var/dsiem/web/dist/assets/config/esconfig.json: $ cat esconfig.json
{
“elasticsearch”: “http://elasticsearch:9200”,
“kibana”: “http://kibana:5601”
}
/var/log/dsiem in that example to the logs directory inside dsiem install location (/var/dsiem/logs if using the above example). filebeat.yml file to point to your Logstash endpoint address. # [ “$EUID” -ne 0 ] && echo must be run as root! || ( \
cat <<EOF > /etc/systemd/system/dsiem.service
[Unit]
Description=Dsiem
After=network.target
[Service]
Type=simple
WorkingDirectory=/var/dsiem
ExecStart=/var/dsiem/dsiem serve
Restart=on-failure
[Install]
WantedBy=multi-user.target
EOF
systemctl daemon-reload && \
systemctl enable dsiem.service && \
systemctl start dsiem.service && \
systemctl status dsiem.service)
deployments/kibana/dashboard-siem.json. This step will also install all Kibana index-patterns (siem_alarms and siem_events) that will be linked to from Dsiem web UI. $ ./scripts/kbndashboard-import.sh ${your-kibana-IP-or-hostname} ./deployments/kibana/dashboard-siem.json Uninstalling Dsiem
For docker-compose installation, just run the following:
$ cd dsiem/deployments/docker && \
docker-compose down -v
or
$ cd dsiem/deployments/docker && \
docker-compose -f docker-compose-cluster.yml down -v
For non docker-compose procedure, you will have to undo all the changes made manually, for example:
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…