SIEM Introduction Seminar - Iman Mansoori
SIEM Introduction Seminar - Iman Mansoori
SIEM Introduction Seminar - Iman Mansoori
@Cisco_in_persian_channel Telegram.me/SOC24x7
Agenda
Agenda
• Instructor Introduction
• Information Security Risk
• Why we need SIEM
• SIEM Components
• Demo - Splunk
Process Malware AV
Systems Exploit Kits Firewall
Network Bots IPS
Application APT Sandbox
Etc. Etc. Etc.
SIEM Components
– Data Collection
– Parser and Normalizer and sometimes enrichment
– Analyzer
– Visualization and dashboard
– Reporting
– Storage
• First step to process and make data meaning is data parsing and normalization
• Here we extract data from our data (logs) and map into what we can understand
• Mostly, Regex is used for parsing
• Mapping our extracted to a field is called normalization
• Here is the example:
regexp="(?P<date>\w{3}\s+\d{1,2}\s\d{2}\:\d{2}\:\d{2})\s+(?P<device>\S+)\s+\S+\s+\S+\s+RT_FLOW\s+-
\s+(?P<module>\S+).*source-address=\"(?P<src_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\"\s+source-
port=\"(?P<src_port>\d+)\"\s+destination-address=\"(?P<dst_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\"\s+destination-
port=\"(?P<dst_port>\d+)\"\s+service-name=\"(?P<service>\S+)\"\s+protocol-id=\"(?P<protocol>\S+)\"\s+icmp-
type=\"(?P<icmp>\S+)\"\s+policy-name=\"(?P<policy>\S+)\"\s+source-zone-
name=\"(?P<src_zone>\S+)\"\s+destination-zone-name=\"(?P<dst_zone>\S+)\".*"
– View my data
– Find anomalies
– situational awareness
• In the final step, SIEM will alert regarding the detected or suspicious incident
• Alerts can be sent via Email, syslog message or an Event
• Event generation helps SIEM to perform multiple event chaining
• Here our alerts our prioritized and evaluated based on :
– Attack severity
– Asset Value
– Relevance
– Risk rating
[email protected]
Tel: +98 9126139728
Telegram.me/SOC24x7
@cisco_in_persian_channel