Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

this is the table of one buggy log ( buggy server generating messages and trasmitting them to a virtual machine suricata on which we have

this is the table of one buggy log (buggy server generating messages and trasmitting them to a virtual machine suricata on which we have FileBeat with module system enabled so we observe the following for one buggy log)_id: o3taRY0BU-qlxAgMWA79
_index: .ds-filebeat-8.11.4-2024.01.15-000001
_score: -
@timestamp: Jan 26,2024 @ 11:39:16.000
agent.ephemeral_id: e52dd3ac-cdff-46fc-8d7a-68892613c4a5
agent.hostname: firewall
agent.id: bc38ef4a-0e57-42d7-b151-344834773fec
agent.name: firewall
agent.type: filebeat
agent.version: 8.11.4
ecs.version: 1.12.0
event.dataset: system.syslog
event.ingested: Jan 26,2024 @ 11:39:25.432
event.kind: event
event.module: system
event.timezone: +01:00
fileset.name: syslog
host.architecture: x86_64
host.containerized: false
host.hostname: 192.168.5.2
host.id: f7b674849cbf4d5ca658b4bb2ef869a7
host.ip: [192.168.5.1,192.168.56.3,192.168.6.1,10.0.5.15]
host.mac: [08-00-27-60-21-18,08-00-27-6A-CE-39,08-00-27-D7-33-75,08-00-27-E6-20-D9]
host.name: firewall
host.os.codename: bullseye
host.os.family: debian
host.os.kernel: 5.10.0-9-amd64
host.os.name: Debian GNU/Linux
host.os.platform: debian
host.os.type: linux
host.os.version: 11(bullseye)
input.type: log
log.file.path: /var/log/syslog
log.offset: 308,726
message: GET /../../../../../etc/./shadow HTTP/1.1
process.name: buggy
related.hosts: 192.168.5.2
service.type: system. and the alerts generated by suricata are: _id PnqbQo0BU-qlxAgMJ_tM
_index .ds-filebeat-8.11.4-2024.01.15-000001
_score -
@timestamp Jan 25,2024@ 22:51:19.000
agent.ephemeral_id ef48918e-0870-47ea-9169-8bba32245f4e
agent.hostname firewall
agent.id bc38ef4a-0e57-42d7-b151-344834773fec
agent.name firewall
agent.type filebeat
agent.version 8.11.4
ecs.version 1.12.0
event.dataset system.syslog
event.ingested Jan 25,2024@ 22:51:20.907
event.kind event
event.module system
event.timezone +01:00
fileset.name syslog
host.architecture x86_64
host.containerized false
host.hostname 192.168.5.2
host.id f7b674849cbf4d5ca658b4bb2ef869a7
host.ip [192.168.5.1,192.168.56.3,192.168.6.1,10.0.5.15]
host.mac [08-00-27-60-21-18,08-00-27-6A-CE-39,08-00-27-D7-33-75,08-00-27-E6-20-D9]
host.name firewall
host.os.codename bullseye
host.os.family debian
host.os.kernel 5.10.0-9-amd64
host.os.name Debian GNU/Linux
host.os.platform debian
host.os.type linux
host.os.version 11(bullseye)
input.type log
log.file.path /var/log/syslog
log.offset 12,775,800
message GET /../../../../../etc/./shadow HTTP/1.1
process.name buggy
related.hosts 192.168.5.2
service.type system. now the goal is to creat an event correlation rule to correlate that triggers alerts if an event cased bvy a directory traversalattack in the BuggyHTTP is followed within 30 seconds at most, by a corresponding alert issued by the suricata IDS. i have already tried
[ network where event.category == "intrusion_detection" and rule.category == "Information Leak" and source.port ==7979 and source.port ==7979]
[ process where process.name == "buggy"]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Transactions On Large Scale Data And Knowledge Centered Systems X Special Issue On Database And Expert Systems Applications Lncs 8220

Authors: Abdelkader Hameurlain ,Josef Kung ,Roland Wagner ,Stephen W. Liddle ,Klaus-Dieter Schewe ,Xiaofang Zhou

2013th Edition

3642412203, 978-3642412202

More Books

Students also viewed these Databases questions

Question

The company has fair promotion/advancement policies.

Answered: 1 week ago