Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OSSIM to geoip-attack-map #25

Open
aungdin opened this issue Mar 26, 2018 · 7 comments
Open

OSSIM to geoip-attack-map #25

aungdin opened this issue Mar 26, 2018 · 7 comments

Comments

@aungdin
Copy link

aungdin commented Mar 26, 2018

How to log normalization ?

@diegodblr
Copy link
Contributor

Hi, I do the normalization using the OSSIM Alien Vault log and a shell script with the swatch tool to put the log in the format of the attack map.

@suhiherazeN1N
Copy link

Can you please elaborate the process @diegodblr

@diegodblr
Copy link
Contributor

diegodblr commented Aug 12, 2019 via email

@suhiherazeN1N
Copy link

suhiherazeN1N commented Aug 12, 2019

Thanks !

But what to do to parse the Cowrie and glastopf honeypot log into the map? Please help I am very much new to this area. @diegodblr

@diegodblr
Copy link
Contributor

Sorry, but I don't know these softwares. Here I work with IDS Suricata.

@suhiherazeN1N
Copy link

Ok. Then can you please elaborate the OSSIM Alien Vault process of Log Normalization? @diegodblr

@diegodblr
Copy link
Contributor

Ok, the all process is:

1 - enable fast log in /etc/suricata/suricata.yaml.
2- configure a shell script to read the fast log and write the log
formatted to DataServer.py. The shell script result is:
echo "$IP,$IP2,$PORT1,$PORT2,$TYPE,$CVE" > /var/log/suricata.log

You can use the software SWATCH to read the fast log. This is the mask to
read the fast log with SWATCH: watchfor
/\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants