Security Information and Event Management

Total Page:16

File Type:pdf, Size:1020Kb

Security Information and Event Management OPEN SOURCE SECURITY INFORMATION MANAGER OSSIM What is OSSIM OSSIM is an open source security system. OSSIM integrates more than 30 open source tools. OSSIM gathers events from any device or application. OSSIM includes a powerful correlation system. OSSIM can be integrated with any already deployed device or application in the network. OSSIM generates a wide number of metrics and reports. OSSIM is easily adaptable (Use what you need) OSSIM can be integrated with proprietary and open source products. What is not OSSIM OSSIM is neither a firewall nor a content proxy OSSIM is not a Security Linux Distribution (Backtrack, WifiSlax) OSSIM is not a product for home use OSSIM is not a simple software package (exe, rpm, deb...) which can be easily installed on any Operative System. Advantages Freeware-no doubt about backdoors. customizable according to requirement. 2300+ data source plugins. Highly Scalable. High Redundancy/Availability. Provide security at every level. (IDS/IPS ,firewall, antivirus servers, proxy, Domain controller, VPN servers, web servers, OS ). Correlation (Cross correlation & Logical Correlation). Correlation Directives (200+) Risk calculation Reporting System Requirements RAM:4GB RAM Processor:64 bit processor LAN Card: e1000 network card OSSIM in Real World Architecture Typically OSSIM consists of four elements; Sensors(Detector + Collector) Detector Generates events. Collector Collects and analyzes data using predefined RegEx. Management Server The main Server tasks as Normalizing, Prioritizing, Collecting, Risk Assessment and Correlating engines The maintenance and external tasks, as backups, scheduled backups, online inventory or scanning launching Database Front end Web Interface How OSSIM Works Devices and/or applications generate security events(Detectors). Events are gathered by OSSIM collector. The collectors send normalized events to the OSSIM Server. The OSSIM Server does a risk calculation for every event. The events are correlated in the OSSIM Server. Events are stored in database. The Web Console offers access to all the information collected and generated by OSSIM. How OSSIM Works OSSIM Operation OSSIM Operations OSSIM Web Interface Integrated Tools Snort Ntop OCS Nfdump and NFSen NetFlow Nagios OpenVAS OSVDB OSSEC NMAP POf Pads ARPWatch TCPtrack Nepenthes Sample Deployment The End Thanks… .
Recommended publications
  • OSSIM: a Careful, Free and Always Available Guardian for Your Network OSSIM a Careful, Free and Always Available Guardian for Your Network
    FEATURE OSSIM: a Careful, Free and Always Available Guardian for Your Network OSSIM a Careful, Free and Always Available Guardian for Your Network Monitor your network’s security 24/7 with a free and open-source solution that collects, analyzes and reports logs of the events on your network. MARCO ALAMANNI 68 / JUNE 2014 / WWW.LINUXJOURNAL.COM LJ242-June2014.indd 68 5/22/14 12:36 PM etworks and information check them all, one by one, to obtain systems are increasingly meaningful information. N exposed to attacks that A further difficulty is that there is are becoming more sophisticated no single standard used to record the and sustained over time, such as logs and often, depending on the type the so-called APT (Advanced and size, they are not immediate or Persistent Threats). easy to understand. Information security experts agree It is even more difficult to relate on the fact that no organization, other logs produced by many even the best equipped to protect different systems to each other itself from these attacks, can be manually, to highlight anomalies considered immune, and that the in the network that would not be issue is not whether its systems will detectable by analyzing the logs of be compromised, but rather when each machine separately. and how it will happen. SIEM (Security Information and It is essential to be able to Event Management) software, detect attacks in a timely manner therefore, is not limited to and implement the relative being a centralized solution for countermeasures, following log management, but also (and appropriate procedures to respond especially) it has the ability to to incidents, thus minimizing the standardize logs in a single format, effects and the damages they can analyze the recorded events, cause.
    [Show full text]
  • Popular OSSIM Plugins Sidebar for a Brief Agent by Running the Command: Listing of the Leading Ones)
    To read more Linux Journal or start your subscription, please visit http://www.linuxjournal.com. AlienVault the Future of Security Information Management Meet AlienVault OSSIM, a complex security system designed to make your life simpler. JERAMIAH BOWLING Security Information Management (SIM) systems have made many security administrators’ lives easier over the years. SIMs organize an enterprise’s security environment and provide a common interface to manage that environment. Many SIM products are available today that perform well in this role, but none are as ambitious as AlienVault’s Open Source Security Information Management (OSSIM). With OSSIM, AlienVault has harnessed the capabilities of several popular security packages and created an “intelligence” that translates, analyzes and organizes the data in unique and customizable ways that most SIMs cannot. It uses a process called correlation to make threat judgments dynamically and report in real time on the state of risk in your environment. The end result is a design approach that makes risk management an organized and observable process that security administrators and managers alike can appreciate. In this article, I explain the installation of an all-in-one OSSIM agent/server into a test network, add hosts, deploy a Figure 1. A little tough to read, but this is where everything starts. third-party agent, set up a custom security directive and take a quick tour of the built-in incident response system. In addition AlienVault site in .iso form (version 2.1 at the time of this to the OSSIM server, I have placed a CentOS-based Apache writing) and booted my VM from the media.
    [Show full text]
  • OSSIM Fast Guide
    ----------------- OSSIM Fast Guide ----------------- February 8, 2004 Julio Casal <[email protected]> http://www.ossim.net WHAT IS OSSIM? In three phrases: - VERIFICATION may be OSSIM’s most valuable contribution at this time. Using its correlation engine, OSSIM screens out a large percentage of false positives. - The second advantage is that of INTEGRATION, we have a series of security tools that enable us to perform a range of tasks from auditing, pattern matching and anomaly detection to forensic analysis in one single platform. We take responsibility for testing the stability of these programs and providing patches for them to work together. - The third is RISK ASSESSMENT, OSSIM offers high level state indicators that allow us to guide inspection and measure the security situation of our network. * DISTRIBUTION - OSSIM integrates a number of powerful open source security tools in a single distribution. These include: - Snort - Nessus - Ntop - Snortcenter - Acid - Riskmeter - Spade - RRD - Nmap, P0f, Arpwatch, etc.. - These tools are linked together in OSSIM’s console giving the user a single, integrated navigation environment. * ARCHITECTURE - OSSIM is organized into 3 layers: . Sensors . Servers . Console - The database is independent of these layers and could be considered to be a fourth layer. OSSIM 2004/02/07 Sensors - Sensors integrate powerful software in order to provide three capabilities: . IDS . Anomaly Detection . Real time Monitoring - Sensors can also perform other functions including traffic consolidation on a segment and event normalization. - Sensors communicate and receive orders from the server using a proprietary protocol. Server - OSSIM’s server has the following capabilities: . Correlation . Prioritization . Online inventory . Risk assessment . Normalization Console The console’s interface is structured hierarchically with the following functions: .
    [Show full text]
  • OSSIM, Una Alternativa Para La Integración De La Gestión De Seguridad En La Red
    Revista Telem@tica. Vol. 11. No. 1, enero-abril, 2012, p. 11-19 ISSN 1729-3804 OSSIM, una alternativa para la integración de la gestión de seguridad en la red Walter Baluja García1, Cesar Camilo Caro Reina2, Frank Abel Cancio Bello3 1 ISPJAE, Ingeniero en Telecomunicaciones y Electrónica, Dr. C. Tec. [email protected] 2ISPJAE. Estudiantes de 5to Año de Telecomunicaciones y Electrónica [email protected] 3 ISPJAE, Ingeniero en Informática [email protected] RESUMEN / ABSTRACT En la actualidad resulta cada vez más complicado mantenerse asegurado frente a los diferentes ataques que se pueden presentar en una red, lo cual resulta en una gestión de seguridad mucho más compleja para los administradores de red. Para cumplir con ese cometido los gestores utilizan un grupo de soluciones que permiten automatizar su trabajo, gestionando grandes volúmenes de información. El presente artículo realiza un breve resumen sobre los sistemas de Administración de Información y Eventos de Seguridad (SIEM por sus siglas en ingles), revisando sus principales características, y continua con la descripción del sistema OSSIM Alienvault, donde se muestran su arquitectura y componentes. Palabras claves: Gestión, Seguridad, SIEM, OSSIM. OSSIM, an alternative network management and protection: Actuality is more difficult to maintain a system secured from the different threats that exist on a network, this results in more complex security management for network managers. This paper briefly summarizes Security Information and Event Management systems (SIEM), it reviews the main characteristics and continues with a description of OSSIM Alienvault System, showing its components and architecture. Keywords: Management, Security, SIEM, OSSIM.
    [Show full text]
  • Alienvault OSSIM Installation Guide
    AlienVault Installation Guide AlienVault LC - 1901 S Bascom Avenue Suite 220 Campbell, CA, 95008 T +1 408 465-9989 [email protected] wwww.alienvault.com Juan Manuel Lorenzo ([email protected]) Version 1.5 Copyright © AlienVault 2010 All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or me- chanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written per- mission of the copyright owner and publisher. Any trademarks referenced herein are the property of their respective holders. AlienVault LC - 1901 S Bascom Avenue Suite 220 Campbell, CA, 95008 T +1 408 465-9989 [email protected] wwww.alienvault.com AlienVault Table of Contents Introduction! 1 About this Installation Guide! 1 AlienVault Professional SIEM! 2 What is AlienVault Professional SIEM?! 2 Basic Operation! 3 Components! 4 Detector! 4 Collector! 5 SIEM! 5 Logger! 5 Web interface! 5 Before installing AlienVault! 6 Installation Profiles! 6 Sensor! 6 Server! 7 Framework! 7 Database! 7 All-in-one! 7 Overview of the AlienVault installation procedure! 8 Automated Installation! 8 Custom Installation! 8 What you will need! 9 Professional Key! 9 Role of the installed system! 9 Network configuration for the Management Network card! 9 Requirements! 10 Hardware requirements! 10 Network requirements! 10 Obtaining AlienVault Installation Media! 11 Downloading the installer from AlienVault Website! 11 Creating a boot CD! 11 Booting the installer! 11 AlienVault Installation
    [Show full text]
  • Una Possibile Soluzione Per L'analisi Di Sicurezza All-In-One
    Public Una possibile soluzione per l’analisi di sicurezza all-in-one AlienVault-OSSIM in configurazione all-in-one per branch office e sedi medio piccole Gianluca Peco INFN CCR Workshop Public Public Contesto 4 Panoramica dei sistemi esistenti e scelta Cos’è e cosa fa OSSIM 3 Sommario Com’è fatto OSSIM 2 Implementazione del sistema 1 Demo 5 min. 24 maggio 2021 Gianluca Peco - INFN CCR Workshop 2 Public Public Contesto Anche a seguito dell’evoluzione delle linee guida di sicurezza delle informazioni risulta estremamente utile dotarsi di uno strumento per il monitoring, l’analisi e la correlazione di eventi di sicurezza (ma non solo), a supporto della difesa attiva, della compliance e dell’analisi forense. Grandi quantità di dati prodotti dai sistemi di log, dai firewall perimetrali, dalle sonde IDS (Intrusion Detection Systems) e dai sistemi EDR (Endpoint Detection and Response) sono spesso inutilizzati fino all’evento negativo. Esistono strumenti per l’analisi e la correlazione real-time degli eventi di sicurezza sia opensource che commerciali. I sistemi IT si sono stratificati e differenziati al punto da richiedere la gestione distribuita di attività storicamente centralizzate come l’analisi dei log e degli eventi. 24 maggio 2021 Gianluca Peco - INFN CCR Workshop 3 Public Public Stadi evolutivi della cybersecurity Fonte: https://www.trianz.com/cybersecurity 24 maggio 2021 Gianluca Peco - INFN CCR Workshop 4 Public Public Definizione di SIEM (1/2) https://it.wikipedia.org/wiki/Security_Information_and_Event_Management Software e servizi che integrano vari componenti per fornire analisi in tempo reale degli eventi, la possibilità di fornire report inerenti ai dati raccolti, rispondendo alle esigenze di incident response, compliance e analisi forense.
    [Show full text]
  • Case Study: Open-Source Networked Infrastructure Management
    Research Publication Date: 25 March 2008 ID Number: G00155852 Case Study: Open-Source Networked Infrastructure Management Geoff Johnson Networked infrastructures can be reliably managed more affordably than traditional vendors' solutions by using open-source-based appliances and network management tools. Open-source solutions — including Nagios for host, service and network monitoring; GroundWork for collaboration; and Open Source Security Information Management (OSSIM) for security information management — have been used by Opengear to create significant alternatives to the traditional management of networked IT infrastructure. Key Findings • Use of open-source solutions in networked IT operations management can be a valid and reliable approach. • IT operations managers should consider "best fit for purpose" solutions, such as open- source software (OSS) solutions, as well as best-of-breed solutions. Recommendations • Invite and evaluate OSS solutions when choosing management tools in IT operations. • Examine the scope for open source in new IT requirements and for tactical fixes to operational problems. • Ensure that end users of open-source applications across your business understand the legal, staffing and developer requirements in the new open-source community and ecosystem to which they are committing. • Use external resources from network service providers (NSPs) and integrators, rather than internal staff, for open-source applications. © 2008 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such.
    [Show full text]
  • Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 – General Implementation Guidance
    NISTIR 8183A Volume 1 Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 – General Implementation Guidance Keith Stouffer Timothy Zimmerman CheeYee Tang Jeffrey Cichonski Michael Pease Neeraj Shah Wesley Downard This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8183A-1 NISTIR 8183A Volume 1 Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 – General Implementation Guidance Keith Stouffer Neeraj Shah Timothy Zimmerman Strativia, LLC CheeYee Tang Largo, Maryland Michael Pease Intelligent Systems Division Engineering Laboratory Jeffrey Cichonski Wesley Downard Applied Cybersecurity Division G2, Inc. Information Technology Laboratory Annapolis Junction, Maryland This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8183A-1 September 2019 U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology National Institute of Standards and Technology Internal Report 8183A, Volume 1 81 pages (September 2019) This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8183A-1 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by federal agencies even before the completion of such companion publications.
    [Show full text]
  • OWASP Logging Guide
    OWASP Logging Guide SUMMARY Why log ?............................................................................................................................................................. 2 What is commonly logged ? ................................................................................................................................ 2 What are security logs ?....................................................................................................................................... 2 What are the most common issues with logging ? ............................................................................................. 2 What are the common functions of a log management infrastructure ?.............................................................. 3 General............................................................................................................................................................. 3 Storage............................................................................................................................................................. 3 Analysis ........................................................................................................................................................... 3 Disposal ........................................................................................................................................................... 3 How to plan a logging infrastructure ? ...............................................................................................................
    [Show full text]
  • Fonctionnement D'ossim
    Fonctionnement d’OSSIM Dans le cadre de SIMS - Security Intrusion Management System (http ://www.tcom.ch/Tcom/Projets/SIMS/sims.html) Auteur : Joel¨ Winteregg ([email protected]) Chef de projet : Cyril Friche Professeur : Stefano Ventura Ecole´ : Swiss University of Applied Sciences (EIVD) Tcom institut (http ://www.tcom.ch) Date : 31 mai 2005 Table des matieres` 1 Fonctionnement logiciel d’OSSIM 3 1.1 Les applications Ossim-server et Ossim-agent ....................... 3 1.2 Fonctionnement de l’architecture avec une sonde Snort .................. 3 1.2.1 Pourquoi deux flux d’informations ? ........................ 3 1.3 Fonctionnement de l’architecture avec une sonde Ntop .................. 5 1.3.1 Ntop c’est quoi ? .................................. 5 1.3.2 Fonctionnement ................................... 6 1.4 Fonctionnement de l’architecture avec une sonde P0f ................... 6 1.4.1 P0f c’est quoi ? ................................... 7 1.4.2 Fonctionnement ................................... 7 1.5 Fonctionnement de l’architecture avec une sonde TCPTrack ............... 7 1.5.1 TCPTrack c’est quoi ? ............................... 7 1.5.2 Fonctionnement ................................... 7 1.6 Fonctionnement de l’architecture avec une sonde PADS .................. 8 1.6.1 PADS c’est quoi ? .................................. 8 1.6.2 Fonctionnement ................................... 9 1.7 Fonctionnement de l’architecture avec une sonde Syslog ................. 9 1.7.1 Qu’est-ce qu’une sonde HIDS ........................... 9 1.7.2 Fonctionnement ................................... 10 A Installation et configuration d’Ossim-server 11 A.1 Prerequis´ .......................................... 11 A.2 Installation ......................................... 11 A.3 Configuration ........................................ 12 A.3.1 Configuration du serveur Web ........................... 13 B Ajout et configuration d’une sonde Snort 14 B.1 Installation ......................................... 14 B.1.1 Snort .......................................
    [Show full text]
  • USM Appliance Deployment Guide
    USM Appliance™ Deployment Guide Copyright © 2021 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or affiliated companies. All other marks are the property of their respective owners. Updated April 27, 2021 2 USM Appliance™ Deployment Guide Contents System Overview 7 About USM Appliance 8 About USM Appliance System Architecture and Components 16 Event Collection, Processing, and Correlation Workflow 18 USM Appliance Deployments 23 USM Appliance Deployments 24 USM Appliance Deployment Types 25 USM Appliance Deployment Requirements 30 Firewall Permissions 33 Configure the USM Appliance Hardware 36 Deploy USM Appliance in VMware 50 Deploy USM Appliance Using Hyper-V Manager 55 Deploy USM Appliance with AMI 61 Configure the USM Appliance Sensor after Deployment 64 Configure the USM Appliance Logger after Deployment 65 Configure the USM Appliance Enterprise Server and Enterprise Database 70 Set Up the Management Interface 72 Register USM Appliance 73 USM Appliance Initial Setup 77 Access the AlienVault Setup Menu 78 Configure Network Interfaces 80 Configure the Search Domain 83 Configure a Hostname for USM Appliance 83 Change the Default Time Zone 84 Configure USM Appliance to Use a DNS 85 Configure Synchronization with an NTP Server 86 Configure USM Appliance to Recognize Your Local Keyboard 86 Configure Custom HTTPS Certificates in USM Appliance 87 Create the Default Admin User 89 USM Appliance™ Deployment Guide 3 Configure Mail
    [Show full text]
  • Installing OSSIM on a Debian GNU/Linux
    Installing OSSIM on a Debian GNU/Linux David Gil Stéphane Fournier Installing OSSIM on a Debian GNU/Linux by David Gil and Stéphane Fournier Revision History Revision 0.1 2004-10-21 Revised by: sfournier Conversion from plain text to Docbook v4.2 and update of debian packages versions Table of Contents 1. Introduction........................................................................................................................................................1 1.1. Foreword..................................................................................................................................................1 1.2. Structure considerations ..........................................................................................................................1 1.3. Lazy install ..............................................................................................................................................1 1.4. Necessary software installation...............................................................................................................2 2. Databases ............................................................................................................................................................3 2.1. Ossim database........................................................................................................................................3 2.2. Snort/Acid database.................................................................................................................................4
    [Show full text]