Skip to content

sisoc-tokyo/STIX2_ES_detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Real-time Log Analysis Tool with STIX 2.0

We publish the tools used by our research. The tools are tested in the following environment.

  • Elastic Stack

    • Elasticsearch: 5.6.4
    • Logstash: 5.6.4
    • Python 3
  • Proxy Server

    • Squid:3.3
    • Filebeat:5.5.1
  • Real-time detection
    The tools for Real-time detection is here
     The programs for detection launched by Logstash when proxy logs are transferred in real time.
     This tool compares each proxylog with blacklists and if matches, sends an alert mail.
     Also add flag "matched" to the "indicator" field in "squid" index which indicates a log matches blacklists.
     Put the tool on the server where Logstash is running.

 The useage is the following.
 Specify the conf file path so that Logstash can loads "logstash.con" during starting.
e.g.)logstash -f /etc/logstash/conf.d/logstash.conf &
The deteciton program "search_blacklist.py" is lauched when Logstash receives logs from Filebeat.

  • Past log setection
    The tool for past log detection is here.
     Extract domain or IP address from STIX 2.0 indicators, registers them in the blacklist.
     Compare the extracted domain or IP address with proxy logs, if there is a log which matches indicators, add flag "matched" to the "indicator" field in "squid" index which indicates a log matches blacklists.
    Put the tool on the PC which manages Elastic Stack(e.g. A PC which can access the REST API of Elastic Stack)

 The useage is the following.
 python input_report.py {IP address of Elastic Stack}:9200 {STIX 2.0 format json file}
e.g)python input_report.py 192.0.2.100:9200 apt1.json

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages