Skip to content

vmware-samples/net-sec-analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

network-security-analyser

Photon OS 3.0

Table of Contents

Overview

The Network Security analyzer is a collection of open source network security montioring tools configured to work together that enables security personals to keep an eye on the data traversing through their network by analyzing and storing the network packets captured.

While suricata performs signature based intrusion detection, zeek does an in-depth analysis for multiple protocols as well detects anamolies. Moloch being a full packet capture engine, provides evidence and artifacts for further investigation.

Architecture

VMware Photon OS can be deployed to any vSphere-based infrastructure, including an on-premises and/or any public cloud environment, running on vSphere such as VMware Cloud on AWS or VMware Cloud on Dell-EMC.

Setup requires a minimal Photon OS to be deployed using an OVA or ISO image.

Network Security Analysis comprises of multiple OpenSource solutions:

The install also includes PF_RING installation that helps improve packet capture rate.

Prerequisites

  • A PhotonOS VM with outbound internet connection, refer PhotonOS Network Configuration
  • VM requires a network adaptor for management interface and depending on the requirement add a secondary NIC for ingesting traffic from a SPAN or TAP device.
  • Create a local user called 'netsec' and provide sudo priviliges.

QuickStart

Modify configuration

  • MONITOR_INTERFACE, Moloch credentails, PF_RING version etc can be updated by modifying src/scripts/install.sh script.
  • By default all applications are configured to listen on eth0 interface, this can be changed to second NIC added to the VM in case of ingesting span/tap traffic.
  • When a secondary network interface is configured for span/tap, use the below command to bring up the interface: /sbin/ip link set eth1 up
  • A systemd service can be configured to bring up the interface automatically -
cat /etc/systemd/system/span_iface.service
[Unit]
Description=Bring up Span interface
[Service]
Type=oneshot
ExecStart=/sbin/ip link set eth1 up
[Install]
WantedBy=multi-user.target
  • Enable at boot and start interface
systemctl enable span_iface
systemctl start span_iface

Tests

  • Tests are performed by loading a sample PCAP provided in the install package and can be run using the scripts provided in test dir.

ReachUs

Feel free to reach out to the Team:

Contributing

The Network security analyzer team welcomes contributions from the community. Before you start working with Network security analyzer, please read our Developer Certificate of Origin. All contributions to this repository must be signed as described on that page. Your signature certifies that you wrote the patch or have the right to pass it on as an open-source patch. For more detailed information, refer to CONTRIBUTING.md.

License

Network Security Analyzer is available under the BSD-2 license. Please see LICENSE.txt.

About

Network security monitoring and analysis

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published