-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Generic Log Sources - Network protocols/services #46
Comments
a full taxonomy/schema 🙃 and here we are.. life has come full circle. |
Hello @defensivedepth , @neu5ron! My two cents: (correct me if I am wrong) the main reason for having the logsources is the simplicity for rule developers via adding a layer of abstraction above similar log sources. To make it work for us, the logsources should provide us with:
So, based on described, I believe that one of the ways could be:
What do you guys think? |
so should keep it at category level. thus can still have specifics of rules that may apply to a specific product/service. but keep the larger category for "all". otherwise use: i had already started SMB in ossem that has some windows events mapped and zeek mapped - @defensivedepth you have the suricata to zeek one to one for smb? if so, I can probably start this PoC pretty soon.. |
i like "network flows" - just not the name :) |
and yeah again I don't like the network category, because in both practice and theory a lot of things can be network and endpoint rules - event 5145 & zeek/suricata smb, windows kerberos auth & zeek/suricata kerberos, windows dce rpc stuff & zeek/suricata, scheduled task or gpo modifications & zeek smb files/mappings, etc etc etc |
@yugoslavskiy what do you think of my above comments? |
|
Hey @neu5ron ! Thanks for such a detailed answer! As you said, there are many tricky things like collecting I am not sure if the taxonomy/categorization is something we can all agree on. Let's do something that will work for all of us, and for @defensivedepth specifically. |
Hi all! It makes definitive sense to create generic log sources for network protocols and map them via configurations to specific network or endpoint detection log sources like Zeek, Suricata or Windows logs. Chosing the right log source naming is challenging here, there are arguments for both alternatives. Personally, I prefer the
Regarding the taxonomy for the generic log source I'm generally fine with OSSEM. It's a clean taxonomy and it's open (also in sense that it's not bound to any vendor). |
@neu5ron ! we should continue the conversations on this about helping integrating OSSEM for the generic log source (network wise at the moment). Let's talk more about it when we meet soon ;) . Looking forward to it! Company agnostic open source projects working together would be amazing! 🙏 🍻 |
Zeek and Suricata generate overlapping datasets, specifically around protocol analysis. I would recommend that we look at creating some generic log sources focused on the overlapping protocol analysis fields. A good place to start would be smb.
The text was updated successfully, but these errors were encountered: