SlideShare a Scribd company logo
ELK in Security analytics
-- Lionel Faleiro
Lionel Faleiro [ @sandmaxprime ]
About Me
• Trainer and Security Analyst at Institute
of Information Technology / Network
Intelligence India
• 4+ years experience in IT
• Conducted Trainings at multiple
corporates
• Part of the DFIR Team at NII
• Key domains – Security Analytics,
Malware Analysis, Log Analysis, Intrusion
Response
Lionel Faleiro [ @sandmaxprime ]
Lionel Faleiro [ @sandmaxprime ]
What Big Data..
• IS:
• Store large volumes of
data
• Enables us to run
queries on the data set
• IS NOT:
• Hadoop, Hive, Pig, Yarn
– these are
technologies
• Does not automatically
give you analytical
results
Lionel Faleiro [ @sandmaxprime ]
Why use Big Data in Security?
• User-behaviour
analytics
• Fraud Detection
• Log correlation from
additional sources
• Forensic analysis on
large volumes of data
Lionel Faleiro [ @sandmaxprime ]
Known SIEM
Issues
• Unable to ingest a lot of log sources
• Cost of storage is high
• Requires more compute power
• Licensing issues
• Monitoring on each endpoint is
problematic
• Current monitoring is static in nature
• Too many alerts
Lionel Faleiro [ @sandmaxprime ]
SIEM + ELK = SOC 2.0
• SIEM Functions
• Alerts for standard IT issues
• Rules based correlations
• Standard reporting/queries
• ELK Functions
• Visualize Logs for anomalies
• Ingest logs from multiple sources
with large volume
• Implement Threat-Hunting strategy
• Custom search and querying
Lionel Faleiro [ @sandmaxprime ]
This is not
ELK..
Lionel Faleiro [ @sandmaxprime ]
What is ELK?
• E is a NoSQL databased that is based on the Lucene search engine
• Stores data in an unstructured way
• Cannot use SQL to query it.
• L is a log pipeline tool that accepts inputs, executes transformations
and outputs the data into various targets
• K is a visualization layer
Lionel Faleiro [ @sandmaxprime ]
ELK Overview
• Beats
• Log shippers – Windows events, system status, network traffic
• Elasticsearch
• Data storage, search engine
• Logstash
• Log management component. Ingest, Process, Output
• Kibana
• - Create visualizations and dashboards
Lionel Faleiro [ @sandmaxprime ]
ELK Architecture
Lionel Faleiro [ @sandmaxprime ]
Elasticsearch
• Based on Apache Lucene
• Open-source search engine library
• Created by Shay Banon
• Extends Lucene to store, index and search
• JSON over HTTP
Lionel Faleiro [ @sandmaxprime ]
Logstash
• Integrated Log management framework
• Log collection
• Centralization
• Parsing
• Storage
• Written in Jruby
• Runs in JVM
• Multiple input mechanism
• TCP/UDP
• Files
• Sysog
Lionel Faleiro [ @sandmaxprime ]
Logstash: Conf
• Input {}
• Filter {}
• Output {}
Lionel Faleiro [ @sandmaxprime ]
Lionel Faleiro [ @sandmaxprime ]
Kibana
• Visualization platform
• Tight integration with Elasticsearch
Lionel Faleiro [ @sandmaxprime ]
Beats
• Filebeat
• Metricbeat
• Packetbeat
• Winlogbeat
• Hearbeat
Lionel Faleiro [ @sandmaxprime ]
Filebeat
• A lightweight way to
forward and
centralize logs and
files
Lionel Faleiro [ @sandmaxprime ]
Metricbeat
Lionel Faleiro [ @sandmaxprime ]
Packetbeat
• Packetbeat is a lightweight network packet
analyzer that sends data to Logstash
or Elasticsearch
• It supports many application layer protocols,
from database to key-value stores to HTTP
and low-level protocols
Lionel Faleiro [ @sandmaxprime ]
Lionel Faleiro [ @sandmaxprime ]
Winlogbeat
• Winlogbeat live streams Windows event logs to Elasticsearch and
Logstash in a lightweight way
• Read from any windows event log channel
Lionel Faleiro [ @sandmaxprime ]
Lionel Faleiro [ @sandmaxprime ]
Heartbeat
• Monitor services for their availability with active probing
• Heartbeat pings via ICMP, TCP, and HTTP, and also has support for TLS,
authentication and proxies.
Lionel Faleiro [ @sandmaxprime ]
Use Cases
• Nginx/Apache
• Sysmon Integration
• Forensics Imaging
Lionel Faleiro [ @sandmaxprime ]

More Related Content

PDF
Elk - An introduction
PPTX
Log analysis using elk
PPTX
Elastic stack Presentation
PDF
Empower Your Security Practitioners with Elastic SIEM
PPTX
The Elastic Stack as a SIEM
PDF
Keynote: Elastic Security evolution and vision
PPTX
Fleet and elastic agent
PPTX
Getting Started with Splunk (Hands-On)
Elk - An introduction
Log analysis using elk
Elastic stack Presentation
Empower Your Security Practitioners with Elastic SIEM
The Elastic Stack as a SIEM
Keynote: Elastic Security evolution and vision
Fleet and elastic agent
Getting Started with Splunk (Hands-On)

What's hot (20)

PDF
Elastic SIEM (Endpoint Security)
PPTX
Siem solutions R&E
PPTX
Elastic Stack Introduction
PDF
Elastic Security: Unified protection for everyone
PPTX
SplunkLive 2011 Advanced Session
PPTX
IBM Security QRadar
PPTX
SIEM Primer:
PPTX
PPTX
EDR vs SIEM - The fight is on
PDF
2020 07-30 elastic agent + ingest management
PPTX
Splunk Architecture overview
PPTX
Introduction to ELK
PDF
QRadar Architecture.pdf
ODP
Deep Dive Into Elasticsearch
PPTX
Siem ppt
PPTX
SIEM - Your Complete IT Security Arsenal
PDF
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
PPTX
McAfee SIEM solution
PPTX
Security Information and Event Management (SIEM)
PDF
Elastic Observability keynote
Elastic SIEM (Endpoint Security)
Siem solutions R&E
Elastic Stack Introduction
Elastic Security: Unified protection for everyone
SplunkLive 2011 Advanced Session
IBM Security QRadar
SIEM Primer:
EDR vs SIEM - The fight is on
2020 07-30 elastic agent + ingest management
Splunk Architecture overview
Introduction to ELK
QRadar Architecture.pdf
Deep Dive Into Elasticsearch
Siem ppt
SIEM - Your Complete IT Security Arsenal
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
McAfee SIEM solution
Security Information and Event Management (SIEM)
Elastic Observability keynote
Ad

Similar to ELK in Security Analytics (20)

PDF
Apache NiFi - Flow Based Programming Meetup
PPTX
BSIDES-PR Keynote Hunting for Bad Guys
PPTX
Getting started with apache flink streaming api
PPTX
Mentor Graphics Customer Presentation
PDF
122 naver-deview2013-tizen-universal-device-platform-r20131014
PPTX
Accelerate your business with flow
PDF
CodeIgniter - PHP MVC Framework by silicongulf.com
PDF
All Your Security Events Are Belong to ... You!
PDF
All your logs are belong to you!
PPTX
ReflectInsight - Let your application speak volume
PDF
Mobile security chess board - attacks & defense
PPTX
Tactical Application Detection (Defeating Advanced Adversaries)
PPTX
Functionality, security and performance monitoring of web assets (e.g. Joomla...
PPTX
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
PPTX
Essential Layers of IBM i Security: Security Monitoring and Auditing
PPTX
Office 365 and using SharePoint Online
PDF
Enterprise Security in Mainframe-Connected Environments
PPTX
Lima - Digital Forensic Case Management System
PPTX
Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!
PDF
H@dfex 2015 malware analysis
Apache NiFi - Flow Based Programming Meetup
BSIDES-PR Keynote Hunting for Bad Guys
Getting started with apache flink streaming api
Mentor Graphics Customer Presentation
122 naver-deview2013-tizen-universal-device-platform-r20131014
Accelerate your business with flow
CodeIgniter - PHP MVC Framework by silicongulf.com
All Your Security Events Are Belong to ... You!
All your logs are belong to you!
ReflectInsight - Let your application speak volume
Mobile security chess board - attacks & defense
Tactical Application Detection (Defeating Advanced Adversaries)
Functionality, security and performance monitoring of web assets (e.g. Joomla...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
Essential Layers of IBM i Security: Security Monitoring and Auditing
Office 365 and using SharePoint Online
Enterprise Security in Mainframe-Connected Environments
Lima - Digital Forensic Case Management System
Ephesoft & Linux Webinar: Smart Capture™ is Now Even Smarter!
H@dfex 2015 malware analysis
Ad

More from nullowaspmumbai (20)

PPTX
Switch security
PPTX
Radio hacking - Part 1
PPTX
How I got my First CVE
PPTX
Power forensics
PPTX
Infrastructure security & Incident Management
PPTX
Middleware hacking
PPTX
Internet censorship circumvention techniques
PPTX
How i got my first cve
PPTX
Adversarial machine learning updated
PPTX
PPTX
Adversarial machine learning
PPTX
Dll Hijacking
PPTX
Abusing Target
PDF
NTFS Forensics
PPTX
Drozer - An Android Application Security Tool
PPTX
Middleware hacking
PDF
Ganesh naik linux_kernel_internals
PDF
Buffer overflow null
PDF
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Switch security
Radio hacking - Part 1
How I got my First CVE
Power forensics
Infrastructure security & Incident Management
Middleware hacking
Internet censorship circumvention techniques
How i got my first cve
Adversarial machine learning updated
Adversarial machine learning
Dll Hijacking
Abusing Target
NTFS Forensics
Drozer - An Android Application Security Tool
Middleware hacking
Ganesh naik linux_kernel_internals
Buffer overflow null
Null Mumbai Meet_Android Reverse Engineering by Samrat Das

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
MYSQL Presentation for SQL database connectivity

ELK in Security Analytics

  • 1. ELK in Security analytics -- Lionel Faleiro Lionel Faleiro [ @sandmaxprime ]
  • 2. About Me • Trainer and Security Analyst at Institute of Information Technology / Network Intelligence India • 4+ years experience in IT • Conducted Trainings at multiple corporates • Part of the DFIR Team at NII • Key domains – Security Analytics, Malware Analysis, Log Analysis, Intrusion Response Lionel Faleiro [ @sandmaxprime ]
  • 3. Lionel Faleiro [ @sandmaxprime ]
  • 4. What Big Data.. • IS: • Store large volumes of data • Enables us to run queries on the data set • IS NOT: • Hadoop, Hive, Pig, Yarn – these are technologies • Does not automatically give you analytical results Lionel Faleiro [ @sandmaxprime ]
  • 5. Why use Big Data in Security? • User-behaviour analytics • Fraud Detection • Log correlation from additional sources • Forensic analysis on large volumes of data Lionel Faleiro [ @sandmaxprime ]
  • 6. Known SIEM Issues • Unable to ingest a lot of log sources • Cost of storage is high • Requires more compute power • Licensing issues • Monitoring on each endpoint is problematic • Current monitoring is static in nature • Too many alerts Lionel Faleiro [ @sandmaxprime ]
  • 7. SIEM + ELK = SOC 2.0 • SIEM Functions • Alerts for standard IT issues • Rules based correlations • Standard reporting/queries • ELK Functions • Visualize Logs for anomalies • Ingest logs from multiple sources with large volume • Implement Threat-Hunting strategy • Custom search and querying Lionel Faleiro [ @sandmaxprime ]
  • 8. This is not ELK.. Lionel Faleiro [ @sandmaxprime ]
  • 9. What is ELK? • E is a NoSQL databased that is based on the Lucene search engine • Stores data in an unstructured way • Cannot use SQL to query it. • L is a log pipeline tool that accepts inputs, executes transformations and outputs the data into various targets • K is a visualization layer Lionel Faleiro [ @sandmaxprime ]
  • 10. ELK Overview • Beats • Log shippers – Windows events, system status, network traffic • Elasticsearch • Data storage, search engine • Logstash • Log management component. Ingest, Process, Output • Kibana • - Create visualizations and dashboards Lionel Faleiro [ @sandmaxprime ]
  • 11. ELK Architecture Lionel Faleiro [ @sandmaxprime ]
  • 12. Elasticsearch • Based on Apache Lucene • Open-source search engine library • Created by Shay Banon • Extends Lucene to store, index and search • JSON over HTTP Lionel Faleiro [ @sandmaxprime ]
  • 13. Logstash • Integrated Log management framework • Log collection • Centralization • Parsing • Storage • Written in Jruby • Runs in JVM • Multiple input mechanism • TCP/UDP • Files • Sysog Lionel Faleiro [ @sandmaxprime ]
  • 14. Logstash: Conf • Input {} • Filter {} • Output {} Lionel Faleiro [ @sandmaxprime ]
  • 15. Lionel Faleiro [ @sandmaxprime ]
  • 16. Kibana • Visualization platform • Tight integration with Elasticsearch Lionel Faleiro [ @sandmaxprime ]
  • 17. Beats • Filebeat • Metricbeat • Packetbeat • Winlogbeat • Hearbeat Lionel Faleiro [ @sandmaxprime ]
  • 18. Filebeat • A lightweight way to forward and centralize logs and files Lionel Faleiro [ @sandmaxprime ]
  • 19. Metricbeat Lionel Faleiro [ @sandmaxprime ]
  • 20. Packetbeat • Packetbeat is a lightweight network packet analyzer that sends data to Logstash or Elasticsearch • It supports many application layer protocols, from database to key-value stores to HTTP and low-level protocols Lionel Faleiro [ @sandmaxprime ]
  • 21. Lionel Faleiro [ @sandmaxprime ]
  • 22. Winlogbeat • Winlogbeat live streams Windows event logs to Elasticsearch and Logstash in a lightweight way • Read from any windows event log channel Lionel Faleiro [ @sandmaxprime ]
  • 23. Lionel Faleiro [ @sandmaxprime ]
  • 24. Heartbeat • Monitor services for their availability with active probing • Heartbeat pings via ICMP, TCP, and HTTP, and also has support for TLS, authentication and proxies. Lionel Faleiro [ @sandmaxprime ]
  • 25. Use Cases • Nginx/Apache • Sysmon Integration • Forensics Imaging Lionel Faleiro [ @sandmaxprime ]