hi all,
how to separate package dns request malware and bitcoin polling in SIEM ?
hi all,
how to separate package dns request malware and bitcoin polling in SIEM ?
Hi,
How are you receiving these logs? Are you using the Elastic endpoint to collect this data or are relying on an IDS & Proxy implementation?
I send packetbeat to elastic and I want to separate the malware domain in SIEM,
can you do it this way?
Oh, I see! So, a static lookup against a set of domains that you mention?
Yes, it should be possible. You can create signals for your query and then observe triggers if any. Have a look at the signal to detect IRC activity to the internet.
Detection rule alerting SIEM not runing in the elastic subscriptions opensource ?
is there any other way ?
Yes! Use the API to query data, in a scheduled manner and then perform alerting through an external API integration.
You could also look at some third-party libraries. Everything including Elastic SIEM has it's limitations. You could decide, what is acceptable and work on it.
Thank you I will try to use elastic alerts to do domain detection
We have found something similar for DHCP here https://zeglory.com/monitoring-dhcp-using-elk/ but would be very interested in getting this for DNS as well. Could you kindly share something describing the solution in details?
We have found something similar for DHCP here https://zeglory.com/monitoring-dhcp-using-elk/ but would be very interested in getting this for DNS as well. Could you kindly share something describing the solution in details?
This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.
© 2020. All Rights Reserved - Elasticsearch
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant logo are trademarks of the Apache Software Foundation in the United States and/or other countries.