Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system.
It provides OSSIM-style correlation for normalized logs/events, perform lookup/query to threat intelligence and vulnerability information sources, and produces risk-adjusted alarms.
Features
Also Read – Attack Range : Tool To Simulate Attacks Against & Collect Data Into Splunk
How It Works?
On the diagram above:
suricata-*
for logs received from Suricata IDS, ssh-*
for SSH logs, etc.). siem_events-*
. The final result of the above processes is that now we can watch for new alarms and updates to an existing one just by monitoring a single Elasticsearch index.
Installation
The quickest and most reliable way to test Dsiem is to use the supplied Docker Compose files. They include Dsiem, all the required ELK stack, and an example log source (Suricata) pre-configured.
Then after you get a feel on how everything fits together, you can start integrating Dsiem into your existing or custom ELK deployment.
Installing Dsiem
Using Docker Compose
$ unzip dsiem-master.zip && cd dsiem-master
bash
shell): $ export PROMISC_INTERFACE=eth0
eth0
above with the actual interface name given by ifconfig
or similar commands. For testing purpose, it’s not necessary to configure the interface to really operate in promiscuous mode. $ cd deployments/docker && \
sudo chown root $(find conf/filebeat/ conf/filebeat-es/ -name “*.yml”)
$ docker-compose pull
$ docker-compose up
docker-compose
: EXTERNAL_NET: "any"
, so you can easily trigger a test alarm just by continuously pinging a host in the same subnet. Dsiem comes with an example directive configuration that will intercept this “attack”.siem_events-*
, and alarms will be in siem_alarms
. You can view their content from Kibana or Dsiem web UI. Importing Kibana Dashboard
$ ./scripts/kbndashboard-import.sh localhost ./deployments/kibana/dashboard-siem.json
siem_alarms
and siem_events-*
) to have been created before it can be accessed without error. This means you will need to trigger the test alarm described above before attempting to use the dashboard. Using Existing ELK
/var/dsiem
: # [ “$EUID” -ne 0 ] && echo must be run as root! || (\
export DSIEM_DIR=/var/dsiem && \
mkdir -p $DSIEM_DIR && \
wget https://github.com/defenxor/dsiem/releases/latest/download/dsiem-server_linux_amd64.zip -O /tmp/dsiem.zip && \
unzip /tmp/dsiem.zip -d $DSIEM_DIR && rm -rf /tmp/dsiem.zip && \
cd $DSIEM_DIR
/var/dsiem/web/dist/assets/config/esconfig.json
: $ cat esconfig.json
{
“elasticsearch”: “http://elasticsearch:9200”,
“kibana”: “http://kibana:5601”
}
/var/log/dsiem
in that example to the logs
directory inside dsiem install location (/var/dsiem/logs
if using the above example). filebeat.yml
file to point to your Logstash endpoint address. # [ “$EUID” -ne 0 ] && echo must be run as root! || ( \
cat <<EOF > /etc/systemd/system/dsiem.service
[Unit]
Description=Dsiem
After=network.target
[Service]
Type=simple
WorkingDirectory=/var/dsiem
ExecStart=/var/dsiem/dsiem serve
Restart=on-failure
[Install]
WantedBy=multi-user.target
EOF
systemctl daemon-reload && \
systemctl enable dsiem.service && \
systemctl start dsiem.service && \
systemctl status dsiem.service)
deployments/kibana/dashboard-siem.json
. This step will also install all Kibana index-patterns (siem_alarms
and siem_events
) that will be linked to from Dsiem web UI. $ ./scripts/kbndashboard-import.sh ${your-kibana-IP-or-hostname} ./deployments/kibana/dashboard-siem.json Uninstalling Dsiem
For docker-compose
installation, just run the following:
$ cd dsiem/deployments/docker && \
docker-compose down -v
or
$ cd dsiem/deployments/docker && \
docker-compose -f docker-compose-cluster.yml down -v
For non docker-compose
procedure, you will have to undo all the changes made manually, for example:
garak checks if an LLM can be made to fail in a way we don't…
Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration…
ADCFFS is a PowerShell script that can be used to exploit the AD CS container…
Tartufo will, by default, scan the entire history of a git repository for any text…
Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at…
A data hoarder’s dream come true: bundle any web page into a single HTML file.…