SlideShare a Scribd company logo
Practical security monitoring with ELASTIC STACK by Janith Malinga econ2019
Practical security monitoring with ELASTIC STACK by Janith Malinga econ2019
Contents
▪ Why continuous security monitoring
▪ Intro to ELK Stack
▪ Install Elasticsearch and Cerebro
▪ Install Kibana and create dashboards
▪ Install Logstash and create config files
▪ Install filebeat agent and forward logs
CONTINUOUS
SECURITY
MONITORING
INTRODUCTION TO
Security Systems In Use
▪ Firewall
▪ Antivirus software
▪ Web application firewall (waf)
NEW
TRENDS OF
ATTACKS
Emerging Threats
Hackers
New Trends Of Attacks
▪ Supply chain management
▪ Hardware layer
SIEM
"In the field of computer security, security information and event
management (SIEM) software products and services combine security
information management (SIM) and security event management (SEM). They
provide real-time analysis of security alerts generated by applications and
network hardware."
Wikipedia
SIEM
The general perception is that setting up
SIEM is a very expensive exercise, however
with the right knowledge and skill it can be
done at a fraction of the cost.
Functions of a SIEM
Logs
Log Aggregator
Log Broker
Correlation rules
Logs
Logs
Logs
Storage Visualization
Continuous Security Monitoring
▪ End point security monitoring
▪ Network security monitoring
ELK STACK
PRACTICAL SECURITY
MONITORING WITH
Practical security monitoring with ELASTIC STACK by Janith Malinga econ2019
Functions of a SIEM
Logs
Log Aggregator
Log Broker
Correlation rules
Logs
Logs
Logs
Storage Visualization
Elastic Stack vs Commercial SIEM
▪ Elastic Stack
▪ Free, Paid support features
▪ Outstanding visualizations
▪ Advanced log enrichments
▪ Capable handling high volume
• Commercial SIEM
• Licensed on volume, log
sources, events per second
• Limited log enrichment
• High volume = High cost
Minimum Hardware Requirements
▪ Ram: 8GB
▪ Storage: 40GB
▪ 2 Network interfaces
▪ CPU: 64-bit 2.0+ GHz processor or higher
ELASTICSEARCH
Install Elasticsearch
#sudo dpkg -i elasticsearch-6.0.0.deb
Config files locations:-
Elasticsearch has three configuration files:
▪ elasticsearch.yml for configuring Elasticsearch
▪ jvm.options for configuring Elasticsearch JVM settings
▪ log4j2.properties for configuring Elasticsearch logging
Elasticsearch
▪ Distributed, real-time data store, real-time analysis full text search
engine
▪ Opensource
▪ Highly scalable
Indices, Shards and Replicas
▪ An index is stored on a node, which is a part of a cluster
▪ Indices are broken into shards
▪ Each shard is either a primary or replica
▪ Each log item is a document that contains fields and values
CEREBRO
Cerebro
▪ Cerebro is an opensource Elasticsearh web admin tool
▪ Displays cluster health
▪ Makes index managements easy
Install Cerebro
#sudo unzip cerebro-0.7.1.zip -d /opt
#sudo mv /opt/cerebro-0.7.1/ /opt/cerebro/
Create a user for cerebro
#sudo useradd cerebro
Give permissions for the user
#sudo chown -R cerebro: /opt/cerebro/
Create a service for cerebro
#sudo cp cerebro.service /etc/systemd/system
#sudo systemctl daemon-reload
#sudo systemctl enable cerebro.service
#sudo service cerebro start
KIBANA
Install Kibana
#sudo dpkg -i kibana-6.0.0-amd64.deb
Enable kibana service
#sudo systemctl enable kibana.service
Start kibana service
#sudo service kibana start
LOGSTASH
Install Logstash
#sudo dpkg -I logstash-6.2.1.deb
Config file
jvm.options
Logstash Config File Format
input{
}
filter{
}
output{
}
Logstash Config File Format
input {
stdin { codec => "json" }
}
filter {
if [event_id] == 123 {
drop { }
}
}
output {
stdout { codec => rubydebug }
}
THANK YOU
FOLLOW US ON
/econIntconference @econ_int @int.econ

More Related Content

PPTX
Practical Security Monitoring with ELKStack
PDF
Implementing Active Security with Sysdig Falco - Barcelona Software Crafters
PDF
Securing your Kubernetes applications
PDF
Container Security Deep Dive & Kubernetes
PDF
Router Defense - BRUcon 2010
PDF
OpenStack-Ansible Security
PDF
Présentation et démo ELK/SIEM/Wazuh
PDF
Tokyo meetup 20160224
Practical Security Monitoring with ELKStack
Implementing Active Security with Sysdig Falco - Barcelona Software Crafters
Securing your Kubernetes applications
Container Security Deep Dive & Kubernetes
Router Defense - BRUcon 2010
OpenStack-Ansible Security
Présentation et démo ELK/SIEM/Wazuh
Tokyo meetup 20160224

What's hot (20)

PPTX
Security best practices for kubernetes deployment
PPTX
Apache mod security 3.1
PPTX
Hug #9 who's keeping your secrets
PDF
What is Google Cloud Good For at DevFestInspire 2021
PDF
Kubernetes - Security Journey
PDF
How abusing the Docker API led to remote code execution same origin bypass an...
PPTX
BAUG Meetup #1 2022: Публикация ресурсов в Интернет в Microsoft Azure. Обзор ...
PDF
Flexible, simple deployments with OpenStack-Ansible
PPTX
Security Walls in Linux Environment: Practice, Experience, and Results
PDF
Security threats with Kubernetes - Igor Khoroshchenko
PDF
Implementing Active Security with Sysdig Falco - Docker Meetup Barcelona
PDF
Why upgrade to v7.7
PDF
Container Security
PPTX
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
PDF
Issuing temporary credentials for my sql using hashicorp vault
PPTX
Dive into orchestration with Kubernetes
PDF
Kubernetes Security
PDF
Vault
PPTX
Cisco UCS loves Kubernetes, Docker and OpenStack Kolla
ODP
Fusker - A NodeJS Security Framework
Security best practices for kubernetes deployment
Apache mod security 3.1
Hug #9 who's keeping your secrets
What is Google Cloud Good For at DevFestInspire 2021
Kubernetes - Security Journey
How abusing the Docker API led to remote code execution same origin bypass an...
BAUG Meetup #1 2022: Публикация ресурсов в Интернет в Microsoft Azure. Обзор ...
Flexible, simple deployments with OpenStack-Ansible
Security Walls in Linux Environment: Practice, Experience, and Results
Security threats with Kubernetes - Igor Khoroshchenko
Implementing Active Security with Sysdig Falco - Docker Meetup Barcelona
Why upgrade to v7.7
Container Security
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Issuing temporary credentials for my sql using hashicorp vault
Dive into orchestration with Kubernetes
Kubernetes Security
Vault
Cisco UCS loves Kubernetes, Docker and OpenStack Kolla
Fusker - A NodeJS Security Framework
Ad

Similar to Practical security monitoring with ELASTIC STACK by Janith Malinga econ2019 (20)

PPTX
Installation of Elastic search Blue Teams.pptx
PPTX
Introduction to Monitoring Tools for DevOps
PPTX
Introduction to Monitoring Tools for DevOps
PDF
Présentation ELK/SIEM et démo Wazuh
PPTX
Microservices, Continuous Delivery, and Elasticsearch at Capital One
PDF
Installation of EM 12c
PPTX
ELK Ruminating on Logs (Zendcon 2016)
PPTX
Attack monitoring using ElasticSearch Logstash and Kibana
PDF
Automate threat detections and avoid false positives
PDF
Automate threat detections and avoid false positives
PDF
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
PDF
MySQL Audit using Percona audit plugin and ELK
PDF
z/OS Authorized Code Scanner
PPTX
Container & kubernetes
PDF
Automatiza las detecciones de amenazas y evita falsos positivos
PDF
Automatiza las detecciones de amenazas y evita falsos positivos
PDF
Automatiza las detecciones de amenazas y evita los falsos positivos
PPTX
Shared Security Responsibility for the Azure Cloud
PDF
Cloud security : Automate or die
PPTX
Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...
Installation of Elastic search Blue Teams.pptx
Introduction to Monitoring Tools for DevOps
Introduction to Monitoring Tools for DevOps
Présentation ELK/SIEM et démo Wazuh
Microservices, Continuous Delivery, and Elasticsearch at Capital One
Installation of EM 12c
ELK Ruminating on Logs (Zendcon 2016)
Attack monitoring using ElasticSearch Logstash and Kibana
Automate threat detections and avoid false positives
Automate threat detections and avoid false positives
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
MySQL Audit using Percona audit plugin and ELK
z/OS Authorized Code Scanner
Container & kubernetes
Automatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita los falsos positivos
Shared Security Responsibility for the Azure Cloud
Cloud security : Automate or die
Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...
Ad

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
MYSQL Presentation for SQL database connectivity
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
A Presentation on Artificial Intelligence
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
Diabetes mellitus diagnosis method based random forest with bat algorithm
Assigned Numbers - 2025 - Bluetooth® Document
MYSQL Presentation for SQL database connectivity
A comparative analysis of optical character recognition models for extracting...
NewMind AI Weekly Chronicles - August'25-Week II
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
Machine Learning_overview_presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
MIND Revenue Release Quarter 2 2025 Press Release
A Presentation on Artificial Intelligence
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Programs and apps: productivity, graphics, security and other tools

Practical security monitoring with ELASTIC STACK by Janith Malinga econ2019

  • 3. Contents ▪ Why continuous security monitoring ▪ Intro to ELK Stack ▪ Install Elasticsearch and Cerebro ▪ Install Kibana and create dashboards ▪ Install Logstash and create config files ▪ Install filebeat agent and forward logs
  • 5. Security Systems In Use ▪ Firewall ▪ Antivirus software ▪ Web application firewall (waf)
  • 8. New Trends Of Attacks ▪ Supply chain management ▪ Hardware layer
  • 10. "In the field of computer security, security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware." Wikipedia SIEM
  • 11. The general perception is that setting up SIEM is a very expensive exercise, however with the right knowledge and skill it can be done at a fraction of the cost.
  • 12. Functions of a SIEM Logs Log Aggregator Log Broker Correlation rules Logs Logs Logs Storage Visualization
  • 13. Continuous Security Monitoring ▪ End point security monitoring ▪ Network security monitoring
  • 16. Functions of a SIEM Logs Log Aggregator Log Broker Correlation rules Logs Logs Logs Storage Visualization
  • 17. Elastic Stack vs Commercial SIEM ▪ Elastic Stack ▪ Free, Paid support features ▪ Outstanding visualizations ▪ Advanced log enrichments ▪ Capable handling high volume • Commercial SIEM • Licensed on volume, log sources, events per second • Limited log enrichment • High volume = High cost
  • 18. Minimum Hardware Requirements ▪ Ram: 8GB ▪ Storage: 40GB ▪ 2 Network interfaces ▪ CPU: 64-bit 2.0+ GHz processor or higher
  • 20. Install Elasticsearch #sudo dpkg -i elasticsearch-6.0.0.deb Config files locations:- Elasticsearch has three configuration files: ▪ elasticsearch.yml for configuring Elasticsearch ▪ jvm.options for configuring Elasticsearch JVM settings ▪ log4j2.properties for configuring Elasticsearch logging
  • 21. Elasticsearch ▪ Distributed, real-time data store, real-time analysis full text search engine ▪ Opensource ▪ Highly scalable
  • 22. Indices, Shards and Replicas ▪ An index is stored on a node, which is a part of a cluster ▪ Indices are broken into shards ▪ Each shard is either a primary or replica ▪ Each log item is a document that contains fields and values
  • 24. Cerebro ▪ Cerebro is an opensource Elasticsearh web admin tool ▪ Displays cluster health ▪ Makes index managements easy
  • 25. Install Cerebro #sudo unzip cerebro-0.7.1.zip -d /opt #sudo mv /opt/cerebro-0.7.1/ /opt/cerebro/ Create a user for cerebro #sudo useradd cerebro Give permissions for the user #sudo chown -R cerebro: /opt/cerebro/ Create a service for cerebro #sudo cp cerebro.service /etc/systemd/system #sudo systemctl daemon-reload #sudo systemctl enable cerebro.service #sudo service cerebro start
  • 27. Install Kibana #sudo dpkg -i kibana-6.0.0-amd64.deb Enable kibana service #sudo systemctl enable kibana.service Start kibana service #sudo service kibana start
  • 29. Install Logstash #sudo dpkg -I logstash-6.2.1.deb Config file jvm.options
  • 30. Logstash Config File Format input{ } filter{ } output{ }
  • 31. Logstash Config File Format input { stdin { codec => "json" } } filter { if [event_id] == 123 { drop { } } } output { stdout { codec => rubydebug } }
  • 33. FOLLOW US ON /econIntconference @econ_int @int.econ