728x90
- Log
- Log messages
- motion records generated by log sources in my environment
- Recorde of activity on a network
- Log Source = ANy system that can communicate w/ the network and provides log messages
- It may include user logon system shutdown, application installation, authentication failure, and more
- Raw log = Time consuming for an analyst to locatie and read
- Log messages
- Data Collection
- Where do logs come from?
- Security
- Account logon
- Account management
- Directory service access
- System
- Driver Failure
- IP Address Conflicts
- System Shutdown and Start-up
- Application
- Application crashes and hangs
- SSL Certificate loaded
- Installation failure
- Detection = Using the SIEM to detect a problem in the environment
- Security
- Where do logs come from?
- SIEM
- Meaning: When log sources speak different languages, the SIEM is your translator. Parsing and data normalization are about creating a consistent language for comparison.
- Metadata: Data about the data. Log messages contains data, and the SIEM can extract data about the log messages
- Meta data types
- Contextual Metadata: Parsed directly from the log message, contextual metadata is text based and descriptive
- Login, account, vendor message id, sender, recipient, subject, object
- Quantitative Metadata: Parsed directly from the log message. It can be used for numeric comparison
- Bytes in out, Item in out, duration, size, quantity, amt, rate
- Derived metadata: Using parsed metadata and relating it to the SEIM configuration info, derived metadata adds additional context
- Origin network, impact network, host, zone, direction
- Contextual Metadata: Parsed directly from the log message, contextual metadata is text based and descriptive
- Classification Types
- Audit : An example of an audit-oriented classification is authentication success
- Operations: An example of an operations oriented classification is network traffic
- Security : An example of a security oriented classification is reconnaissance
- Audit > Authentication Success > User Logoff/Logon, Computer Logoff/Logon
- Operations > Network Traffic > Connection Attempt, Connection Closed, Connection Lost, Connection Request
- Security > Network Traffic > Ping Sweep, Port Scan, Traceroute Activity, Vulnerability Scan
728x90
'공부 > IT 기타' 카테고리의 다른 글
Business Intelligence & Analytics (0) | 2024.04.25 |
---|---|
Real Estates Photography (0) | 2024.04.18 |
CLF-C01: AWS Certified Cloud Practitioner 합격 후기 및 덤프 (2023) (8) | 2024.04.12 |
Sample Statistics (1) | 2024.04.12 |
CH1,2 - Social Engineering attacks (0) | 2024.04.12 |