SlideShare a Scribd company logo
7
Most read
11
Most read
14
Most read
SIEM
Security Information and
Event Management
Background on Network
components
 Firewall
 Router
 Switch
 Anti-virus
 Duo two factor authentication
 Server
 Workstation
 Other sources
Log Management
 Log management : states that the information
regarding an incident is recorded in several
places, such as firewalls, routers, network IDS,
host IDS and application logs.
 Send the duplicate logs to the centralized syslog
 Infrastructure: log generation, log analysis and
storage, and log monitoring.
Communication of logs via Ports
 Devices like workstations send
logs to the Syslog Servers by
Transmission Control
Protocol(TCP) by 3 way
handshake (Syn, Syn Ack, Ack)
 Devices like Palo Alto send logs
to the Syslog Servers by Secure
Socket Layer(SSL)
 The other devices like Lanco sends logs to Syslog Servers by User
Datagram Protocol(UDP) which do not have 3 way handshake process.
 The syslog Server receives logs by 514 port
Common ports
 22-SSH
 53-DNS
 123-NTP
 80-HTTP
 443-HTTPS
 3389-RDP
Transition of Logs
 The syslog forwards those logs to the event processor/flow processor.
The logs are processed and CORRELATED OFFENSES are sent to the
management console.
 The logs can be monitored in Qradar SIEM tool with the combination of
all components, the event processors, the flow processors, and the
management console
Syslog Server
 Syslog-ng is a computer program that can act as a
server or a client to send or receive device logs.
 Linux is the operating system of CHS syslog
servers.
 Syslog admin controls the data, deletes, updates
the files if necessary
 Syslog admin use cron to schedule jobs to manage
the logs at fixed times, dates or intervals.
SIEM Objectives
 Identify threats and possible breaches
 Collect audit logs for security and compliance
 Conduct investigations and provide evidence
SIEM presentation final
SIEM Overview
 A software provides the log management
infrastructure encompassing log analysis, log
storage, and log monitoring tiers.
 It also has Event correlation, altering, incident
management, reporting, and forensic investigation
 SIEM technology aggregates the event data
produced by security devices, network devices,
systems and applications
 Event data is combined with contextual
information about users, data and assets.
 Technology provides real time security monitoring,
historical analysis, incident investigation and
compliance reporting.
SIEM Features
 Log activity: monitor and display network events
in real time or perform advanced searches
 Network activity: investigate the communication
sessions between two hosts
 Assets: automatically creates asset profiles by
using passive flow data and vulnerability data to
discover your network servers and hosts.
 Offenses: investigate offenses to determine the
root cause of a network issue
SIEM Features
 Reports: create custom reports or use default reports
 Data Collection: accepts information in various formats
and from a wide range of devices, including security
events, network traffic, and scan results.
 Events are generated by log sources such as
firewalls, routers, servers, and intrusion detection
systems (IDS) or intrusion prevention systems (IPS).
 Flows provide information about network traffic and
can be sent to QRadar SIEM in various formats,
including flowlog files, NetFlow, J-Flow, sFlow, and
Packeteer
 import VA information from various third-party
scanners.
SIEM Features
 Rules: perform tests on events, flows, or offenses,
and if all the conditions of a test are met, the rule
generates a response
 Supported web browser: For the features in IBM
Security QRadar products to work properly, you
must use a supported web browser.
SIEM Features
AQL
 The Ariel Query Language (AQL) is a structured query
language that you use to communicate with the Ariel
databases. Use AQL to manage event and flow data from
the Ariel database.
 Retrieve specific fields from the events, flows and
simarc table in the Ariel database
 SELECT statement, WHERE clause, GROUPBY clause,
ORDERBY clause, LIKE clause, COUNT function
SIEM presentation final
SIEM presentation final
SIEM presentation final
SIEM presentation final
FireEye interaction with SIEM
 SIEM receives alerts from HX and PX tool of FireEye
 HX: It is the antivirus provided by fire eye to detect the
advanced forms of attacks and malware
 PX: Is the full packet capture solution provided by fire
eye. This allows us to perform network
forensics/investigation
Fire Eye
SIEM presentation final

More Related Content

PPTX
Beginner's Guide to SIEM
AlienVault
 
PPTX
Security Information Event Management - nullhyd
n|u - The Open Security Community
 
PPTX
Security Information and Event Managemen
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
PPTX
What is SIEM
Patten John
 
PPTX
SIEM : Security Information and Event Management
SHRIYARAI4
 
PPTX
QRadar, ArcSight and Splunk
M sharifi
 
PPTX
Introduction to SIEM.pptx
neoalt
 
PPTX
Security Information and Event Management (SIEM)
hardik soni
 
Beginner's Guide to SIEM
AlienVault
 
Security Information Event Management - nullhyd
n|u - The Open Security Community
 
Security Information and Event Managemen
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
What is SIEM
Patten John
 
SIEM : Security Information and Event Management
SHRIYARAI4
 
QRadar, ArcSight and Splunk
M sharifi
 
Introduction to SIEM.pptx
neoalt
 
Security Information and Event Management (SIEM)
hardik soni
 

What's hot (20)

PDF
What is SIEM? A Brilliant Guide to the Basics
Sagar Joshi
 
PPTX
Siem solutions R&E
Owais Ahmad
 
PPTX
SOAR and SIEM.pptx
Ajit Wadhawan
 
PPTX
Splunk Phantom SOAR Roundtable
Splunk
 
PPTX
Cyber Threat Hunting Workshop
Digit Oktavianto
 
PPTX
Security Information and Event Management (SIEM)
k33a
 
PDF
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
PDF
IBM Qradar & resilient
Prime Infoserv
 
PDF
PaloAlto Enterprise Security Solution
Prime Infoserv
 
PDF
QRadar Architecture.pdf
PencilData
 
PDF
SIEM Architecture
Nishanth Kumar Pathi
 
PPTX
Insight into SOAR
DNIF
 
PDF
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
PPT
The Trouble with Cloud Forensics
Sharique Rizvi
 
PDF
introduction to Azure Sentinel
Robert Crane
 
PPTX
IBM Security QRadar
Virginia Fernandez
 
PDF
SIEM and SOC
Abolfazl Naderi
 
PPTX
Siem ppt
kmehul
 
PPTX
Logging, monitoring and auditing
Piyush Jain
 
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
What is SIEM? A Brilliant Guide to the Basics
Sagar Joshi
 
Siem solutions R&E
Owais Ahmad
 
SOAR and SIEM.pptx
Ajit Wadhawan
 
Splunk Phantom SOAR Roundtable
Splunk
 
Cyber Threat Hunting Workshop
Digit Oktavianto
 
Security Information and Event Management (SIEM)
k33a
 
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
IBM Qradar & resilient
Prime Infoserv
 
PaloAlto Enterprise Security Solution
Prime Infoserv
 
QRadar Architecture.pdf
PencilData
 
SIEM Architecture
Nishanth Kumar Pathi
 
Insight into SOAR
DNIF
 
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
The Trouble with Cloud Forensics
Sharique Rizvi
 
introduction to Azure Sentinel
Robert Crane
 
IBM Security QRadar
Virginia Fernandez
 
SIEM and SOC
Abolfazl Naderi
 
Siem ppt
kmehul
 
Logging, monitoring and auditing
Piyush Jain
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
Ad

Viewers also liked (20)

PDF
Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...
Alaaeddine Tlich
 
PDF
Comment réussir un projet de supervision de sécurité #SIEM #Succès
David Maillard
 
PDF
Mise en place d'une solution du supérvision réseau
Rabeb Boumaiza
 
PDF
VTEX @ Splunk Live! São Paulo
Fábio Caldas
 
PDF
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]
Sébastien Rabaud
 
PPT
SplunkLive! Paris 2015 - Euler Hermes
Splunk
 
PPTX
Splunk 5 Overview Analyst v1.0
Splunk
 
PPTX
Présentation sur splunk
Najib Ihsine
 
PPTX
IPTV
Fathi Makni
 
PPTX
Implementing and Running SIEM: Approaches and Lessons
Anton Chuvakin
 
PDF
Rapport De PFE
Nadir Haouari
 
PDF
Security intelligence overview_may 2015 - fr
Serge Richard
 
PDF
Les Francais et les plateformes communautaires de marques
spintank
 
PPT
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
Anton Chuvakin
 
PDF
Rapport PFE
oussama Hafid
 
PPT
Présentation sur la dimension "humaine" des activités de veille et intellige...
Inter-Ligere
 
PPT
L'Intelligence Economique concrète : recettes & bonnes pratiques
Inter-Ligere
 
PDF
Les défis de la sécurité informatique en 2012.
Inter-Ligere
 
PDF
IBM SW Les nouveaux enjeux de la sécurité
Patrick Bouillaud
 
PPTX
Radio cognitive et intelligence artificielle
benouini rachid
 
Mise en place d'une Plateforme de Supervision et de Détection d'Intrusion Sys...
Alaaeddine Tlich
 
Comment réussir un projet de supervision de sécurité #SIEM #Succès
David Maillard
 
Mise en place d'une solution du supérvision réseau
Rabeb Boumaiza
 
VTEX @ Splunk Live! São Paulo
Fábio Caldas
 
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]
Sébastien Rabaud
 
SplunkLive! Paris 2015 - Euler Hermes
Splunk
 
Splunk 5 Overview Analyst v1.0
Splunk
 
Présentation sur splunk
Najib Ihsine
 
Implementing and Running SIEM: Approaches and Lessons
Anton Chuvakin
 
Rapport De PFE
Nadir Haouari
 
Security intelligence overview_may 2015 - fr
Serge Richard
 
Les Francais et les plateformes communautaires de marques
spintank
 
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
Anton Chuvakin
 
Rapport PFE
oussama Hafid
 
Présentation sur la dimension "humaine" des activités de veille et intellige...
Inter-Ligere
 
L'Intelligence Economique concrète : recettes & bonnes pratiques
Inter-Ligere
 
Les défis de la sécurité informatique en 2012.
Inter-Ligere
 
IBM SW Les nouveaux enjeux de la sécurité
Patrick Bouillaud
 
Radio cognitive et intelligence artificielle
benouini rachid
 
Ad

Similar to SIEM presentation final (20)

PDF
Wc4
Said Wali
 
PPTX
IBM i Security SIEM Integration
Precisely
 
PDF
UNIT -III SIEM aur baato kaise hai aap log.pdf
hefagi6193
 
PDF
SIEM for Beginners
BAKOTECH
 
PDF
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Deepak Mishra
 
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
PPTX
Hacking appliances
Jonathan Suldo
 
PPTX
RuSIEM overview (english version)
Olesya Shelestova
 
DOCX
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
PDF
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
Tripwire
 
PPTX
First Responders Course - Session 6 - Detection Systems [2004]
Phil Huggins FBCS CITP
 
PPTX
Security Information Event Management Security Information Event Management
karthikvcyber
 
PPTX
IBM i Security: Identifying the Events That Matter Most
Precisely
 
PDF
Maceo Wattley Contributor Infosec
Dr. Maceo D. Wattley
 
PDF
All your logs are belong to you!
Security BSides London
 
PDF
All Your Security Events Are Belong to ... You!
Xavier Mertens
 
PPT
Logs for Information Assurance and Forensics @ USMA
Anton Chuvakin
 
PPTX
Log management & SIEM
BarakatAbweh
 
DOCX
Security information event management
Jhoni Guerrero
 
PPTX
Siem tools-monitor-your-network
hardik soni
 
IBM i Security SIEM Integration
Precisely
 
UNIT -III SIEM aur baato kaise hai aap log.pdf
hefagi6193
 
SIEM for Beginners
BAKOTECH
 
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Deepak Mishra
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
Hacking appliances
Jonathan Suldo
 
RuSIEM overview (english version)
Olesya Shelestova
 
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
Tripwire
 
First Responders Course - Session 6 - Detection Systems [2004]
Phil Huggins FBCS CITP
 
Security Information Event Management Security Information Event Management
karthikvcyber
 
IBM i Security: Identifying the Events That Matter Most
Precisely
 
Maceo Wattley Contributor Infosec
Dr. Maceo D. Wattley
 
All your logs are belong to you!
Security BSides London
 
All Your Security Events Are Belong to ... You!
Xavier Mertens
 
Logs for Information Assurance and Forensics @ USMA
Anton Chuvakin
 
Log management & SIEM
BarakatAbweh
 
Security information event management
Jhoni Guerrero
 
Siem tools-monitor-your-network
hardik soni
 

SIEM presentation final

  • 2. Background on Network components  Firewall  Router  Switch  Anti-virus  Duo two factor authentication  Server  Workstation  Other sources
  • 3. Log Management  Log management : states that the information regarding an incident is recorded in several places, such as firewalls, routers, network IDS, host IDS and application logs.  Send the duplicate logs to the centralized syslog  Infrastructure: log generation, log analysis and storage, and log monitoring.
  • 4. Communication of logs via Ports  Devices like workstations send logs to the Syslog Servers by Transmission Control Protocol(TCP) by 3 way handshake (Syn, Syn Ack, Ack)  Devices like Palo Alto send logs to the Syslog Servers by Secure Socket Layer(SSL)  The other devices like Lanco sends logs to Syslog Servers by User Datagram Protocol(UDP) which do not have 3 way handshake process.  The syslog Server receives logs by 514 port
  • 5. Common ports  22-SSH  53-DNS  123-NTP  80-HTTP  443-HTTPS  3389-RDP
  • 6. Transition of Logs  The syslog forwards those logs to the event processor/flow processor. The logs are processed and CORRELATED OFFENSES are sent to the management console.  The logs can be monitored in Qradar SIEM tool with the combination of all components, the event processors, the flow processors, and the management console
  • 7. Syslog Server  Syslog-ng is a computer program that can act as a server or a client to send or receive device logs.  Linux is the operating system of CHS syslog servers.  Syslog admin controls the data, deletes, updates the files if necessary  Syslog admin use cron to schedule jobs to manage the logs at fixed times, dates or intervals.
  • 8. SIEM Objectives  Identify threats and possible breaches  Collect audit logs for security and compliance  Conduct investigations and provide evidence
  • 10. SIEM Overview  A software provides the log management infrastructure encompassing log analysis, log storage, and log monitoring tiers.  It also has Event correlation, altering, incident management, reporting, and forensic investigation  SIEM technology aggregates the event data produced by security devices, network devices, systems and applications  Event data is combined with contextual information about users, data and assets.  Technology provides real time security monitoring, historical analysis, incident investigation and compliance reporting.
  • 11. SIEM Features  Log activity: monitor and display network events in real time or perform advanced searches  Network activity: investigate the communication sessions between two hosts  Assets: automatically creates asset profiles by using passive flow data and vulnerability data to discover your network servers and hosts.  Offenses: investigate offenses to determine the root cause of a network issue
  • 12. SIEM Features  Reports: create custom reports or use default reports  Data Collection: accepts information in various formats and from a wide range of devices, including security events, network traffic, and scan results.  Events are generated by log sources such as firewalls, routers, servers, and intrusion detection systems (IDS) or intrusion prevention systems (IPS).  Flows provide information about network traffic and can be sent to QRadar SIEM in various formats, including flowlog files, NetFlow, J-Flow, sFlow, and Packeteer  import VA information from various third-party scanners.
  • 13. SIEM Features  Rules: perform tests on events, flows, or offenses, and if all the conditions of a test are met, the rule generates a response  Supported web browser: For the features in IBM Security QRadar products to work properly, you must use a supported web browser.
  • 15. AQL  The Ariel Query Language (AQL) is a structured query language that you use to communicate with the Ariel databases. Use AQL to manage event and flow data from the Ariel database.  Retrieve specific fields from the events, flows and simarc table in the Ariel database  SELECT statement, WHERE clause, GROUPBY clause, ORDERBY clause, LIKE clause, COUNT function
  • 20. FireEye interaction with SIEM  SIEM receives alerts from HX and PX tool of FireEye  HX: It is the antivirus provided by fire eye to detect the advanced forms of attacks and malware  PX: Is the full packet capture solution provided by fire eye. This allows us to perform network forensics/investigation

Editor's Notes

  • #2: software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications .
  • #4: Security Log Management (Kent & Souppaya, 2006) states that information regarding an incident may be recorded in several places, such as firewalls, routers, network IDS, host IDS, and application logs. log management infrastructure typically comprises of three tiers: log generation, log analysis and storage, and log monitoring. log generation tier involves hosts making their logs available to log servers in the second tier. log analysis and storage tier is composed of one or more log servers receiving log data from the hosts. log monitoring tier contains consoles that are used for monitoring and reviewing of log data and the results of automated analysis.
  • #5: In computer networking, a port is an endpoint of communication in an operating system. While the term is also used for hardware devices, in software it is a logical construct that identifies a specific process or a type of service. The Transmission Control Protocol (TCP) is a core protocol of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. UDP: It has no handshaking dialogues, and thus exposes the user's program to any unreliability of the underlying network protocol. There is no guarantee of delivery, ordering, or duplicate protection. Host A sends a TCP SYNchronize packet to Host B Host B receives A's SYN Host B sends a SYNchronize-ACKnowledgement Host A receives B's SYN-ACK Host A sends ACKnowledge Host B receives ACK.  TCP socket connection is ESTABLISHED.
  • #6: In computer networking, a port is an endpoint of communication in an operating system. While the term is also used for hardware devices, in software it is a logical construct that identifies a specific process or a type of service. SSH SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer.SSH also refers to the suite of utilities that implement the protocol. DNS-  a system for naming computers and network services that is organized into a hierarchy of domains. DNS naming is used in TCP/IP networks, such as the Internet, to locate computers and services through user-friendly names. (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks Hypertext Transfer protocol HTTP is the foundation of data communication for the World Wide Web.  HTTPS: is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. HTTPS encrypts and decrypts user page requests as well as the pages that are returned by the Web server. SMB:  by default, with a thin layer, similar to the Session Message packet of NBT's Session Service, on top of TCP, using TCP port 445 rather than TCP port 139—a feature known as "direct host SMB". RDP: provides a user with a graphical interface to connect to another computer over a network connection.
  • #8: Syslog is a way for network devices to send event messages to a logging server – usually known as a Syslog server. The Syslogprotocol is supported by a wide range of devices and can be used to log different types of events.
  • #11: Security information and event management (SIEM) software provides the log management infrastructure encompassing log analysis, log storage and log monitoring tiers. What sets SIEM products apart from traditional log management software is the ability to perform event correlation, alerting, incident management, reporting and forensic investigation based on event analysis. SIEM technology aggregates the event data produced by security devices, network devices, systems and applications. The primary data source is log data, but SIEM technology can also process other forms of data. Event data is combined with contextual information about users, data and assets. The data is normalized, so that events from disparate sources can be correlated and analyzed for specific purposes, such as network security event monitoring, user activity monitoring or compliance reporting. The technology provides real-time security monitoring, historical analysis, and other support for incident investigation and compliance reporting.
  • #13: Events are generated by log sources such as firewalls, routers, servers, and intrusion detection systems (IDS) or intrusion prevention systems (IPS). Flow data collection Flows provide information about network traffic and can be sent to QRadar SIEM in various formats, including flowlog files, NetFlow, J-Flow, sFlow, and Packeteer. Vulnerability assessment information QRadar SIEM can import VA information from various third-party scanners.
  • #22: Mobile:Malicious apps compromise mobile security to access private information, such as contact lists and calendar details. They also use mobile device features, such as cameras and microphones, to spy, profile users, or conduct cyber attacks. TAP provides enterprise-wide visibility, codified detection expertise and guided investigation workflows to amplify your defense against today’s most sophisticated cyber-attacks. The Threat Analytics Platform applies threat intelligence, expert rules and advanced security data analytics to noisy event data streams. By revealing suspicious behavior patterns and generating alerts that matter, security teams can prioritize and optimize their response efforts.  FireEye Threat Intelligence is the most extensive and immediately operational cyber intelligence. It enables security teams to detect and respond to threats effectively and efficiently. FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution™ (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection. This enables faster detection, more accurate alerts and reduced noise. Identifying threats traditional security solutions can't allows you to focus on alerts that pose a genuine threat and reduce the operational cost of false positives. Cyber criminals often use spear phishing attacks, as well as malicious file attachments and URLs in emails, to launch an advanced cyber attack. These email attacks routinely bypass email security that uses conventional signature-based defenses such as antivirus (AV) and spam filters. FireEye File Content Security (FX Series) products help prevent, detect and respond to cyber attacks by scanning file content for signs of malicious threats. These threats might be brought into an organization from outside sources, such as online file sharing services and portable file storage devices. o reduce the impact of a security incident, organizations should focus on early detection and swift investigation. Enterprise forensics makes this possible. When attacked, an enterprise needs to be able to rapidly investigate and determine the scope and impact of the incident so they can effectively contain the threat and re-secure their network. Your security team should be focused on safeguarding your company’s data assets. Instead, they are overwhelmed by alerts, unable to discern real threats from false alarms. Most security teams can investigate just a small fraction of alerts, most of which turn out to be false alarms. Your managed security services provider (MSSP) is not helping, either. Most likely, they are simply filtering the noise, parsing down the number of alerts from millions to hundreds, telling you that you might have a problem but pushing the investigative burden back on your team. Meanwhile, attackers hide in the noise, operating at will for months before detection.