SlideShare a Scribd company logo
Practical Security Monitoring with ELKStack
Practical Security Monitoring with ELKStack
Contents
 Why continuous security monitoring
 Intro to ELK Stack
 Install Elasticsearch and Cerebro
 Install Kibana and create dashboards
 Install Logstash and create config files
 Install filebeat agent and forward logs
CONTINUOUS
SECURITY
MONITORING
INTRODUCTION TO
Security Systems In Use
 Firewall
 Antivirus software
 Web application firewall (waf)
SIEM
"In the field of computer security, security information and event
management (SIEM) software products and services combine security
information management (SIM) and security event management (SEM).They
provide real-time analysis of security alerts generated by applications and
network hardware."
Wikipedia
SIEM
The general perception is that setting up
SIEM is a very expensive exercise,
however with the right knowledge and
skill it can be done at a fraction of the
cost.
Functions of a SIEM
Logs
Log Aggregator
Log Broker
Correlation rules
Logs
Logs
Logs
Storage Visualization
Continuous Security Monitoring
 End point security monitoring
 Network security monitoring
ELK STACK
PRACTICAL
SECURITY
MONITORING WITH
Practical Security Monitoring with ELKStack
Functions of a SIEM
Logs
Log Aggregator
Log Broker
Correlation rules
Logs
Logs
Logs
Storage Visualization
Elastic Stack vs Commercial SIEM
 Elastic Stack
 Free, Paid support features
 Outstanding visualizations
 Advanced log enrichments
 Capable handling high volume
• Commercial SIEM
• Licensed on volume, log
sources, events per second
• Limited log enrichment
• High volume = High cost
Minimum Hardware Requirements
 Ram: 8GB
 Storage: 40GB
 2 Network interfaces
 CPU: 64-bit 2.0+ GHz processor or higher
ELASTICSEARC
H
Install Elasticsearch
#sudo dpkg -i elasticsearch-6.0.0.deb
Config files locations:-
Elasticsearch has three configuration files:
 elasticsearch.yml for configuring Elasticsearch
 jvm.options for configuring Elasticsearch JVM settings
 log4j2.properties for configuring Elasticsearch logging
Elasticsearch
 Distributed, real-time data store, real-time analysis full text search
engine
 Opensource
 Highly scalable
Indices, Shards and Replicas
 An index is stored on a node, which is a part of a cluster
 Indices are broken into shards
 Each shard is either a primary or replica
 Each log item is a document that contains fields and values
CEREBRO
Cerebro
 Cerebro is an opensource Elasticsearh web admin tool
 Displays cluster health
 Makes index managements easy
Install Cerebro
#sudo unzip cerebro-0.7.1.zip -d /opt
#sudo mv /opt/cerebro-0.7.1/ /opt/cerebro/
Create a user for cerebro
#sudo useradd cerebro
Give permissions for the user
#sudo chown -R cerebro: /opt/cerebro/
Create a service for cerebro
#sudo cp cerebro.service /etc/systemd/system
#sudo systemctl daemon-reload
#sudo systemctl enable cerebro.service
#sudo service cerebro start
KIBANA
Install Kibana
#sudo dpkg -i kibana-6.0.0-amd64.deb
Enable kibana service
#sudo systemctl enable kibana.service
Start kibana service
#sudo service kibana start
LOGSTASH
Install Logstash
#sudo dpkg -I logstash-6.2.1.deb
Config file
jvm.options
Logstash Config File Format
input{
}
filter{
}
output{
}
Logstash Config File Format
input {
stdin { codec => "json" }
}
filter {
if [event_id] == 123 {
drop { }
}
}
output {
stdout { codec => rubydebug }
}
THANK
YOU
FOLLOW US ON
/econIntconference @econ_int @int.econ

More Related Content

PDF
Router Defense - BRUcon 2010
PPT
OpenStack - Security Professionals Information Exchange
PPTX
Best Practices to Secure Your Kubernetes Cluster
PDF
Oscar Cabanillas - Elastic - OSL19
PDF
Microservices: Notes From The Field
PDF
Apcera: Agility and Security in Docker Delivery
PPTX
Remediate and secure your organization with azure sentinel
PDF
Docker + App Container = ocp
Router Defense - BRUcon 2010
OpenStack - Security Professionals Information Exchange
Best Practices to Secure Your Kubernetes Cluster
Oscar Cabanillas - Elastic - OSL19
Microservices: Notes From The Field
Apcera: Agility and Security in Docker Delivery
Remediate and secure your organization with azure sentinel
Docker + App Container = ocp

Similar to Practical Security Monitoring with ELKStack (20)

PDF
Practical security monitoring with ELASTIC STACK by Janith Malinga econ2019
PPTX
Introduction to Monitoring Tools for DevOps
PPTX
Introduction to Monitoring Tools for DevOps
PDF
2015 03-16-elk at-bsides
PPTX
Installation of Elastic search Blue Teams.pptx
PDF
Log analysis with the elk stack
PPTX
The Elastic Stack as a SIEM
PDF
Présentation ELK/SIEM et démo Wazuh
PPTX
It Shore Beats Working: Configuring Elasticsearch to get the Most out of Clo...
PPTX
ELK Ruminating on Logs (Zendcon 2016)
PPTX
MySQL Audit using Percona audit plugin and ELK
PDF
Null Bachaav - May 07 Attack Monitoring workshop.
PDF
ELK stack introduction
PDF
Log analysis with elastic stack
PDF
Logs aggregation and analysis
PPTX
Managing Your Security Logs with Elasticsearch
PPTX
Elk ruminating on logs
PDF
Elasticsearch
PDF
Présentation et démo ELK/SIEM/Wazuh
PDF
The elastic stack on docker
Practical security monitoring with ELASTIC STACK by Janith Malinga econ2019
Introduction to Monitoring Tools for DevOps
Introduction to Monitoring Tools for DevOps
2015 03-16-elk at-bsides
Installation of Elastic search Blue Teams.pptx
Log analysis with the elk stack
The Elastic Stack as a SIEM
Présentation ELK/SIEM et démo Wazuh
It Shore Beats Working: Configuring Elasticsearch to get the Most out of Clo...
ELK Ruminating on Logs (Zendcon 2016)
MySQL Audit using Percona audit plugin and ELK
Null Bachaav - May 07 Attack Monitoring workshop.
ELK stack introduction
Log analysis with elastic stack
Logs aggregation and analysis
Managing Your Security Logs with Elasticsearch
Elk ruminating on logs
Elasticsearch
Présentation et démo ELK/SIEM/Wazuh
The elastic stack on docker
Ad

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
A Presentation on Artificial Intelligence
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
A Presentation on Artificial Intelligence
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Weekly Chronicles - August'25-Week II
sap open course for s4hana steps from ECC to s4
Assigned Numbers - 2025 - Bluetooth® Document
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Ad

Practical Security Monitoring with ELKStack

  • 3. Contents  Why continuous security monitoring  Intro to ELK Stack  Install Elasticsearch and Cerebro  Install Kibana and create dashboards  Install Logstash and create config files  Install filebeat agent and forward logs
  • 5. Security Systems In Use  Firewall  Antivirus software  Web application firewall (waf)
  • 7. "In the field of computer security, security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM).They provide real-time analysis of security alerts generated by applications and network hardware." Wikipedia SIEM
  • 8. The general perception is that setting up SIEM is a very expensive exercise, however with the right knowledge and skill it can be done at a fraction of the cost.
  • 9. Functions of a SIEM Logs Log Aggregator Log Broker Correlation rules Logs Logs Logs Storage Visualization
  • 10. Continuous Security Monitoring  End point security monitoring  Network security monitoring
  • 13. Functions of a SIEM Logs Log Aggregator Log Broker Correlation rules Logs Logs Logs Storage Visualization
  • 14. Elastic Stack vs Commercial SIEM  Elastic Stack  Free, Paid support features  Outstanding visualizations  Advanced log enrichments  Capable handling high volume • Commercial SIEM • Licensed on volume, log sources, events per second • Limited log enrichment • High volume = High cost
  • 15. Minimum Hardware Requirements  Ram: 8GB  Storage: 40GB  2 Network interfaces  CPU: 64-bit 2.0+ GHz processor or higher
  • 17. Install Elasticsearch #sudo dpkg -i elasticsearch-6.0.0.deb Config files locations:- Elasticsearch has three configuration files:  elasticsearch.yml for configuring Elasticsearch  jvm.options for configuring Elasticsearch JVM settings  log4j2.properties for configuring Elasticsearch logging
  • 18. Elasticsearch  Distributed, real-time data store, real-time analysis full text search engine  Opensource  Highly scalable
  • 19. Indices, Shards and Replicas  An index is stored on a node, which is a part of a cluster  Indices are broken into shards  Each shard is either a primary or replica  Each log item is a document that contains fields and values
  • 21. Cerebro  Cerebro is an opensource Elasticsearh web admin tool  Displays cluster health  Makes index managements easy
  • 22. Install Cerebro #sudo unzip cerebro-0.7.1.zip -d /opt #sudo mv /opt/cerebro-0.7.1/ /opt/cerebro/ Create a user for cerebro #sudo useradd cerebro Give permissions for the user #sudo chown -R cerebro: /opt/cerebro/ Create a service for cerebro #sudo cp cerebro.service /etc/systemd/system #sudo systemctl daemon-reload #sudo systemctl enable cerebro.service #sudo service cerebro start
  • 24. Install Kibana #sudo dpkg -i kibana-6.0.0-amd64.deb Enable kibana service #sudo systemctl enable kibana.service Start kibana service #sudo service kibana start
  • 26. Install Logstash #sudo dpkg -I logstash-6.2.1.deb Config file jvm.options
  • 27. Logstash Config File Format input{ } filter{ } output{ }
  • 28. Logstash Config File Format input { stdin { codec => "json" } } filter { if [event_id] == 123 { drop { } } } output { stdout { codec => rubydebug } }
  • 30. FOLLOW US ON /econIntconference @econ_int @int.econ