SlideShare a Scribd company logo
All Your Security Events
 are Belong to ...You!
    InfoSecurity 2011 - Xavier Mertens
$ whoami
• Xavier Mertens
• Senior Security Consultant
• CISSP, CISA, CeH
• Security Blogger
• Volunteer for security projects like:
$ cat disclaimer.txt

“The opinions expressed in this presentation
are those of the speaker and do not reflect
those of past, present or future employers,
partners or customers”
Today’s Situation
Are You Ready?

• Most organizations are NOT prepared to
  deal with security incidents
• If anything can go wrong, it will!
  (Murphy’s law)
• Assigned internal resources?
Technical Issues
• Networks are complex
• Some components/knowledge are
  outsourced
• Millions of daily events
• Lot of console/tools
• Lot of protocols/applications
Find the Differences
Aug 27 14:33:01 macosx ipfw: 12190 Deny TCP
192.168.13.1:2060 192.168.13.104:5000 in via en1


%PIX-3-313001: Denied ICMP type=11, code=0 from
192.168.30.2 on interface 2
Economic Issues

• “Time is money”
 • Real-time operations
 • Downtime has a huge financial impact
• Reduced staff & budget
• Happy shareholders
Legal Issues

• Compliance requirements
 • Big names
 • Initiated by the group or business
• Local laws
• Due diligence & due care
Belgian Example: CBFA
 From a document published in April 2009:

 “Tout établissement qui connecte son
 infrastructure sur Internet dispose d’une politique
 de sécurité qui tient compte de:
 ...
 la création, l’archivage de fichier “historique
 d’évènements” techniques adaptés à leur
 analyse, leur suivi et leur reporting.”
Challenges

• Creation & archiving of log files
• Analyze (Normalization)
• Follow-up
• Reporting
Layer Approach
           Correlation

            Reporting

             Search

             Storage

          Normalization

          Log Collection
Raw Material

• Your logs are belong to you
• If not stored internally (cloud,
  outsourcing), claim access to them
• All applications/devices generate events
• Developers, you MUST generate GOOD
  events
3rd Party Sources

• Vulnerabilities Databases
• Blacklists (IP addresses, ASNs)
• “Physical” Data
 • Geolocalization
 • Badge readers
The Recipe
Collection

• Push or pull methods
• Use a supported protocols
• Ensure integrity
• As close as the source
Normalization

• Parse events
• Fill in common fields
 • Date, Src, Dst, User, Device, Type, Port, ...
Storage

• Index
• Store
• Archive
• Ensure integrity (again)
Search

• You know Google?
• Investigations / Forensic
• Looking for “smoke signals”
Reporting


• Automated / On-demand
• Reliable only if first steps are successfull
Correlation

• Generation of new events based on the
  way other events occurred (based on their
  logic, their time or recurrence)
• Correlation will be successful only of the
  other layers are properly working
• Is a step to incident management
Build Your Toolbox
<warning>
Please keep v€ndor$
   away from the
    next slide ;-)
     </warning>
Let’s Kill Some Myths
• Big players do not always provide the best
  solutions. A Formula-1 is touchy to drive!
• Why pay $$$ and use <10% of the
  features? (the “Microsoft Office” effect)
• But even free softwares have costs!
• False sense of security
LM vs. SIEM

• A LM (“Log Management”) addresses the
  lowest layers from the collection to
  reporting.
• A SIEM (“Security Information & Event
  Management”) adds the correlation layer
  (and incidents management tools)
Grocery Shopping
• Compliance
• Suspicious activity
• Web applications monitoring
• Correlation
• Supported devices
• Buying a SIEM is a very specific project
Free Tools to the
     Rescue
Syslog Daemons
• Syslog is well implemented
• Lot of forked implementations
 • syslogd, rsyslogd, syslog-ng
 • Multiple sources
 • Supports TLS, TCP
• Several tools exists to export to Syslog
  (ex: SNARE)
SEC

• “Simple Event Correlation”
• Performs correlation of logs based on Perl
  regex
• Produces new events, triggers scripts,
  writes to files
OSSEC
• HIDS
• Log collection & parsing
• Active-Response
• Rootkit detection
• File integrity checking
• Agents (UNIX, Windows)
• Log archiving
Miscellaneous

• MySQL
• iptables / ulogd
• GoogleMaps API
• Some Perl code
• Cloud Services (don’t be afraid)
Personal Researches
• Examples based on OSSEC!
• MySQL integrity audit
• USB stick detection in Windows
  environments
• Detecting rogue access
• Mapping data on Google Maps
Visibility!
• LaaS (Loggly)
• Splunk
• Secviz.org
Example of Visualization
Conclusions
• The raw material is already yours!
• The amount of data cannot be reviewed
  manually.
• Suspicious activity occurs below the radar.
• Stick to your requirements!
• It costs $$$ and HH:MM
• Make your logs more valuable via external
  sources
Thank You!
  Q&A?
http://blog.rootshell.be
http://twitter.com/xme

More Related Content

PDF
All Your Security Events Are Belong to ... You!
PPTX
Enterprise Forensics 101
PPTX
Incident response live demo slides final
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PDF
Positive Hack Days 7 - Ransomware forensiсs
PPTX
Risks vs real life
PPTX
Beginner's Guide to SIEM
PPTX
Practical Defense
All Your Security Events Are Belong to ... You!
Enterprise Forensics 101
Incident response live demo slides final
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Positive Hack Days 7 - Ransomware forensiсs
Risks vs real life
Beginner's Guide to SIEM
Practical Defense

What's hot (20)

PPTX
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
PPTX
QIWI SOC benchmarking: Blue Team story
PDF
Logz.io Jenkins Meetup
PPTX
SIEM - Activating Defense through Response by Ankur Vats
PDF
CNIT 125 7. Security Assessment and Testing
PPTX
Cloud Security Zen: Principles to Meditate On
PDF
CNIT 121: 17 Remediation Introduction (Part 1)
PDF
CISSP Prep: Ch 8. Security Operations
PPTX
Hp arcsight services 2014 ewb
PPTX
The Subversive Six: Hidden Risk Points in ICS
DOC
PDF
Windows Threat Hunting
PDF
PDF
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
PDF
1. Security and Risk Management
PPTX
Security Information and Event Management (SIEM)
PPTX
Rethinking Security: The Cloud Infrastructure Effect
PPTX
SIEM presentation final
PPTX
encase enterprise
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
QIWI SOC benchmarking: Blue Team story
Logz.io Jenkins Meetup
SIEM - Activating Defense through Response by Ankur Vats
CNIT 125 7. Security Assessment and Testing
Cloud Security Zen: Principles to Meditate On
CNIT 121: 17 Remediation Introduction (Part 1)
CISSP Prep: Ch 8. Security Operations
Hp arcsight services 2014 ewb
The Subversive Six: Hidden Risk Points in ICS
Windows Threat Hunting
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
1. Security and Risk Management
Security Information and Event Management (SIEM)
Rethinking Security: The Cloud Infrastructure Effect
SIEM presentation final
encase enterprise
Ad

Viewers also liked (16)

PDF
$HOME Sweet $HOME
PDF
Automatic MIME Attachments Triage
PDF
ISSA Siem Fraud
PDF
The BruCO"NSA" Network
PDF
$HOME Sweet $HOME Devoxx 2015
PDF
What Will You Investigate Today?
PDF
Because we are just humans
PDF
Building A Poor man’s Fir3Ey3 Mail Scanner
PDF
$HOME Sweet $HOME SANSFIRE Edition
PDF
ISACA Ethical Hacking Presentation 10/2011
PDF
Secure Web Coding
PDF
Developers are from Mars, Security guys are from Venus
KEY
Unity makes strength
PPT
Mobile Apps Security
PDF
Mobile Security
KEY
Social Networks - The Good and the Bad
$HOME Sweet $HOME
Automatic MIME Attachments Triage
ISSA Siem Fraud
The BruCO"NSA" Network
$HOME Sweet $HOME Devoxx 2015
What Will You Investigate Today?
Because we are just humans
Building A Poor man’s Fir3Ey3 Mail Scanner
$HOME Sweet $HOME SANSFIRE Edition
ISACA Ethical Hacking Presentation 10/2011
Secure Web Coding
Developers are from Mars, Security guys are from Venus
Unity makes strength
Mobile Apps Security
Mobile Security
Social Networks - The Good and the Bad
Ad

Similar to InfoSecurity.be 2011 (20)

PDF
All your logs are belong to you!
PPT
FIRST 2006 Full-day Tutorial on Logs for Incident Response
PPTX
Log management &amp; SIEM
PDF
UNIT -III SIEM aur baato kaise hai aap log.pdf
PPT
Making Logs Sexy Again: Can We Finally Lose The Regexes?
PPT
Belnet events management
PPT
Events Management or How to Survive Security Incidents
PPT
What Every Organization Should Log And Monitor
PPTX
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
PPTX
Security Information Event Management Security Information Event Management
PDF
Incident response before:after breach
PPTX
Log Standards & Future Trends by Dr. Anton Chuvakin
PPTX
SIEM Primer:
PDF
Preventing The Next Data Breach Through Log Management
PPT
Logs for Information Assurance and Forensics @ USMA
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PDF
SIEM for Beginners
PDF
Big security for big data
PPTX
Karunia Wijaya - Proactive Incident Handling
PPTX
Introduction to SIEM.pptx
All your logs are belong to you!
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Log management &amp; SIEM
UNIT -III SIEM aur baato kaise hai aap log.pdf
Making Logs Sexy Again: Can We Finally Lose The Regexes?
Belnet events management
Events Management or How to Survive Security Incidents
What Every Organization Should Log And Monitor
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
Security Information Event Management Security Information Event Management
Incident response before:after breach
Log Standards & Future Trends by Dr. Anton Chuvakin
SIEM Primer:
Preventing The Next Data Breach Through Log Management
Logs for Information Assurance and Forensics @ USMA
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners
Big security for big data
Karunia Wijaya - Proactive Incident Handling
Introduction to SIEM.pptx

More from Xavier Mertens (10)

PDF
FPC for the Masses (SANSFire Edition)
PDF
FPC for the Masses - CoRIIN 2018
PDF
HTTP For the Good or the Bad - FSEC Edition
PDF
Unity Makes Strength
PDF
HTTP For the Good or the Bad
PDF
Malware Analysis Using Free Software
PDF
You have a SIEM! And now?
PDF
What are-you-investigate-today? (version 2.0)
PDF
Unity Makes Strength SOURCE Dublin 2013
PDF
BruCON 2010 Lightning Talk
FPC for the Masses (SANSFire Edition)
FPC for the Masses - CoRIIN 2018
HTTP For the Good or the Bad - FSEC Edition
Unity Makes Strength
HTTP For the Good or the Bad
Malware Analysis Using Free Software
You have a SIEM! And now?
What are-you-investigate-today? (version 2.0)
Unity Makes Strength SOURCE Dublin 2013
BruCON 2010 Lightning Talk

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Modernizing your data center with Dell and AMD
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Modernizing your data center with Dell and AMD
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Monthly Chronicles - July 2025
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)

InfoSecurity.be 2011

  • 1. All Your Security Events are Belong to ...You! InfoSecurity 2011 - Xavier Mertens
  • 2. $ whoami • Xavier Mertens • Senior Security Consultant • CISSP, CISA, CeH • Security Blogger • Volunteer for security projects like:
  • 3. $ cat disclaimer.txt “The opinions expressed in this presentation are those of the speaker and do not reflect those of past, present or future employers, partners or customers”
  • 5. Are You Ready? • Most organizations are NOT prepared to deal with security incidents • If anything can go wrong, it will! (Murphy’s law) • Assigned internal resources?
  • 6. Technical Issues • Networks are complex • Some components/knowledge are outsourced • Millions of daily events • Lot of console/tools • Lot of protocols/applications
  • 7. Find the Differences Aug 27 14:33:01 macosx ipfw: 12190 Deny TCP 192.168.13.1:2060 192.168.13.104:5000 in via en1 %PIX-3-313001: Denied ICMP type=11, code=0 from 192.168.30.2 on interface 2
  • 8. Economic Issues • “Time is money” • Real-time operations • Downtime has a huge financial impact • Reduced staff & budget • Happy shareholders
  • 9. Legal Issues • Compliance requirements • Big names • Initiated by the group or business • Local laws • Due diligence & due care
  • 10. Belgian Example: CBFA From a document published in April 2009: “Tout établissement qui connecte son infrastructure sur Internet dispose d’une politique de sécurité qui tient compte de: ... la création, l’archivage de fichier “historique d’évènements” techniques adaptés à leur analyse, leur suivi et leur reporting.”
  • 11. Challenges • Creation & archiving of log files • Analyze (Normalization) • Follow-up • Reporting
  • 12. Layer Approach Correlation Reporting Search Storage Normalization Log Collection
  • 13. Raw Material • Your logs are belong to you • If not stored internally (cloud, outsourcing), claim access to them • All applications/devices generate events • Developers, you MUST generate GOOD events
  • 14. 3rd Party Sources • Vulnerabilities Databases • Blacklists (IP addresses, ASNs) • “Physical” Data • Geolocalization • Badge readers
  • 16. Collection • Push or pull methods • Use a supported protocols • Ensure integrity • As close as the source
  • 17. Normalization • Parse events • Fill in common fields • Date, Src, Dst, User, Device, Type, Port, ...
  • 18. Storage • Index • Store • Archive • Ensure integrity (again)
  • 19. Search • You know Google? • Investigations / Forensic • Looking for “smoke signals”
  • 20. Reporting • Automated / On-demand • Reliable only if first steps are successfull
  • 21. Correlation • Generation of new events based on the way other events occurred (based on their logic, their time or recurrence) • Correlation will be successful only of the other layers are properly working • Is a step to incident management
  • 23. <warning> Please keep v€ndor$ away from the next slide ;-) </warning>
  • 24. Let’s Kill Some Myths • Big players do not always provide the best solutions. A Formula-1 is touchy to drive! • Why pay $$$ and use <10% of the features? (the “Microsoft Office” effect) • But even free softwares have costs! • False sense of security
  • 25. LM vs. SIEM • A LM (“Log Management”) addresses the lowest layers from the collection to reporting. • A SIEM (“Security Information & Event Management”) adds the correlation layer (and incidents management tools)
  • 26. Grocery Shopping • Compliance • Suspicious activity • Web applications monitoring • Correlation • Supported devices • Buying a SIEM is a very specific project
  • 27. Free Tools to the Rescue
  • 28. Syslog Daemons • Syslog is well implemented • Lot of forked implementations • syslogd, rsyslogd, syslog-ng • Multiple sources • Supports TLS, TCP • Several tools exists to export to Syslog (ex: SNARE)
  • 29. SEC • “Simple Event Correlation” • Performs correlation of logs based on Perl regex • Produces new events, triggers scripts, writes to files
  • 30. OSSEC • HIDS • Log collection & parsing • Active-Response • Rootkit detection • File integrity checking • Agents (UNIX, Windows) • Log archiving
  • 31. Miscellaneous • MySQL • iptables / ulogd • GoogleMaps API • Some Perl code • Cloud Services (don’t be afraid)
  • 32. Personal Researches • Examples based on OSSEC! • MySQL integrity audit • USB stick detection in Windows environments • Detecting rogue access • Mapping data on Google Maps
  • 33. Visibility! • LaaS (Loggly) • Splunk • Secviz.org
  • 35. Conclusions • The raw material is already yours! • The amount of data cannot be reviewed manually. • Suspicious activity occurs below the radar. • Stick to your requirements! • It costs $$$ and HH:MM • Make your logs more valuable via external sources
  • 36. Thank You! Q&A? http://blog.rootshell.be http://twitter.com/xme