Git Product home page Git Product logo

ti_mod's Introduction

TI_Mod

Threat Intel with Elastic - Minemeld integration with Elasticsearch

Threat intelligence feeds

knowledge really is a power. Knowing the methods and tools attackers are most likely to use can help you better prepare your cybersecurity architecture. Threat intelligence feeds can assist in this process by identifying common indicators of compromise (IOC) and recommending necessary steps to prevent attack or infection.

  • Threat intelligence feeds are constantly updating streams of indicators or artifacts derived from a source outside the organization.
  • By comparing threat feeds with internal telemetry, you can automate the production of highly valuable operational intelligence.
  • Selecting the right feeds isn’t enough. You should be constantly monitoring the ROI of feeds to determine their value to your organization.

Threat Intelligence Tool

There are various Threat intelligence tools from various security vendors that climb over each other to address the consumer demand for help with the growing number of threats. Architecting an advanced threat intelligence product/tool hugely simplify the process of combining and prioritizing alerts from multiple sources, as well as providing a wide variety of additional benefits. Opensource feeds are a very good data source in which you can analyse and have the source of feeds that could be of interest to your environment.

Use Case

Elastic stack can be used as an effective security analytics platform when architected efficiently. Threat feeds indexed into the elastic can be compared and proceeded with your security data (firewall, IPS/IDS, proxy data) for automatic alerting and visualization when your network traffic is talking with such Indicators of compromise.

Prerequisites

  • This blog expects to have elastic stack to be readily configured.
  • VM/server with minimum 4 GB of RAM

Tools used

  • Mienmeld – Open source Threat feeds developed by paloalto
  • Logstash configuration for minelemeld

Minemeld is an open-source application that streamlines the aggregation, enforcement and sharing of threat intelligence.

Work flow

  • collect and aggregate threat intelligence across public, private and commercial intelligence sources
  • filter, deduplicate and consolidate metadata across all sources
  • Consolidated data is consumed by third party enforcement infrastructure. [Elastic Logstash in our case]

Logical Flow

All Threat feeds -- > Input Node --- > Processor Node -- > Logstash output node

Data sources are feeds called as miner from which IOC are collected . Collected IOC are processed with processor for aggregation and de duplication. Prcocessed IOC are sent to configured output format.

Input Node There are various Source feeds available for IPv4 by default. Still you can navigate to any of the input node, click new and edit the source of the feed if you wish to collect from any customised feed URL or from your internal environment.

Processer Node IPv4 aggregator processor nodes are available by default. It can be used or the same can be cloned/newly edited with your customised tags and name.

Output Node We would be using Logstash Output node which will send processed feeds to the Logstash node in a TCP stream with default host to be local host/127.0.0.1 and default port of 5414. The Logstash output node can be edited as new node to customise the Logstash host and port if needed.

Architecture

Ti_mod - architecture

Installation and configuration

Minemeld Can be easily and directly installed with their Ansible playbook. more details in their Minemeld-Github

CentOS would be used for this demonstration and complete installation and threat feed configuration is available in config_doc folder

Logstash configuration

Logstash configuration file that can be used for processing the threat feeds into elastic search index is available in config_doc

What’s Next?

Logstash Configured. Threat feeds collected, processed and loaded into elastic search using configured Logstash. Now it is time to get best out of threat intel feeds. Various visualising/monitoring and alerting methods to use the indexed feeds are continuously updated in use-case directory.

  • Method 1 : Analyse your network traffic with the Threat intel data already stored in elastic before the network traffic being written to elastic.
  • Method 2 : Get your intel feeds and network data in a separate index, have a watcher alert when the data in the two indices match.

Next steps

  • Create watcher alert using intel data (method 2)
  • Create executive threat intel dashboard
  • Integrate URL and Domain feeds and create more use cases

Contribution

Continuous enhancement and improvement with use cases, visualisations, upgradation with latest version of elasticstack is the development goal of the project. Help with your expertise to enhance the project more robust and stable.

ti_mod's People

Contributors

hkcyberstark avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.