Answered step by step
Verified Expert Solution
Question
1 Approved Answer
this is the table of one buggy log ( buggy server generating messages and trasmitting them to a virtual machine suricata on which we have
this is the table of one buggy log buggy server generating messages and trasmitting them to a virtual machine suricata on which we have FileBeat with module system enabled so we observe the following for one buggy logid: otaRYBUqlxAgMWA
index: dsfilebeat
score:
@timestamp: Jan @ ::
agent.ephemeralid: eddaccdfffcdaca
agent.hostname: firewall
agent.id: bcefaedbfec
agent.name: firewall
agent.type: filebeat
agent.version:
ecs.version:
event.dataset: system.syslog
event.ingested: Jan @ ::
event.kind: event
event.module: system
event.timezone: :
fileset.name: syslog
host.architecture: x
host.containerized: false
host.hostname:
host.id: fbcbfdcabbbefa
host.ip:
host.mac: ACEDED
host.name: firewall
host.oscodename: bullseye
host.osfamily: debian
host.oskernel: amd
host.osname: Debian GNULinux
host.osplatform: debian
host.ostype: linux
host.osversion: bullseye
input.type: log
logfile.path: varlogsyslog
logoffset:
message: GET etcshadow HTTP
process.name: buggy
related.hosts:
service.type: system. and the alerts generated by suricata are: id PnqbQoBUqlxAgMJtM
index dsfilebeat
score
@timestamp Jan @ ::
agent.ephemeralid efeeabbafe
agent.hostname firewall
agent.id bcefaedbfec
agent.name firewall
agent.type filebeat
agent.version
ecs.version
event.dataset system.syslog
event.ingested Jan @ ::
event.kind event
event.module system
event.timezone :
fileset.name syslog
host.architecture x
host.containerized false
host.hostname
host.id fbcbfdcabbbefa
host.ip
host.mac ACEDED
host.name firewall
host.oscodename bullseye
host.osfamily debian
host.oskernel amd
host.osname Debian GNULinux
host.osplatform debian
host.ostype linux
host.osversion bullseye
input.type log
logfile.path varlogsyslog
logoffset
message GET etcshadow HTTP
process.name buggy
related.hosts
service.type system. now the goal is to creat an event correlation rule to correlate that triggers alerts if an event cased bvy a directory traversalattack in the BuggyHTTP is followed within seconds at most, by a corresponding alert issued by the suricata IDS. i have already tried
network where event.category "intrusiondetection" and rule.category "Information Leak" and source.port and source.port
process where process.name "buggy"
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started