AlientVault-OSSIM

 

AV.Logo.OSSIM.Black

 

 

Security Information Management (SIM) systems have made many security administrators’ lives easier over the years. SIMs organize an enterprise’s security environment and provide a common interface to manage that environment. Many SIM products are available today that perform well in this role, but none are as ambitious as AlienVault’s Open Source Security Information Management (OSSIM).

 

 

With OSSIM, AlienVault has harnessed the capabilities of several popular security packages and created an intelligence’s that translates, analyzes and organizes the data in unique and customizable ways that most SIMs cannot. It uses a process called correlation to make threat judgments dynamically and report in real time on the state of risk in your environment. The end result is a design approach that makes risk management an organized and observable process that security administrators and managers alike can appreciate.

 

 

OSSIM provides all of the features that a security professional needs from a SIEM offering a event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the reality many security professionals face: a SIEM is useless without the basic security controls necessary for security visibility.

 

 

OSSIM addresses this reality by providing the essential security capabilities built into a unified platform. Standing on the shoulders of the many proven open source security controls built into the platform, OSSIM continues to be the fastest way to make the first steps towards unified security visibility.

 

 

 
OSSIM features the following software components:

 

• Arpwatch, used for MAC address anomaly detection.

• P0f, used for passive OS detection and OS change analysis.
• PADS, used for service anomaly detection.

• OpenVAS, used for vulnerability assessment and for cross correlation of (Intrusion detection system (IDS) alerts vs Vulnerability Scanner) information.
• Snort, used as an Intrusion detection system (IDS), and also used for cross correlation with Nessus.

• Suricata. , used as an Intrusion detection system (IDS), as of version 4.2 this is the IDS used in the default configuration.
• Tcptrack, used for session data information which can grant useful information for attack correlation.

• Ntop, for recording traffic patterns between hosts and host groups, and statistics on protocol usage.
• Nagios, used to monitor host and service availability information based on a host asset database.

• OSSEC, a Host-based intrusion detection system (HIDS).
• Munin, for traffic analysis and service watchdogging.

• NFSen/NFDump, used to collect and analyze NetFlow information.
• FProbe, used to generate NetFlow data from captured traffic.

• OSSIM also includes self developed tools, the most important being a generic correlation engine with logical directive support and logs integration with plugins.

 

 

 

 

 

In this article, I explain the installation of an all-in-one OSSIM agent/server into a test network, add hosts, deploy a third-party agent, set up a custom security directive and take a quick tour of the built-in incident response system

 

 

Installation:

 

To keep deployment time to a minimum, I deployed OSSIM on a KVM-based virtual machine (VM). OSSIM is built on Debian, so you can deploy it to any hardware that Debian supports. I used the downloadable installation media from the AlienVault site in .iso form and booted my VM from the media.

 
You can download latest iso image here   AlienVault_OSSIM_64Bits_4.3.4.iso

On bootup, you will see a rather busy and slightly difficult-to-read install screen .If you’ve seen Debian install screens, the OSSIM installer will look very familiar. Set your language preferences and partition your hard drive(s). Configure your settings for Postfix if desired. Finally, set your root password, and enter a static IP address for the server when prompted. The installer will restart the machine to complete the configuration.

 

Screenshot

 

 

 

Screenshot-1

 

 

 

Screenshot-2

 

 

 

Screenshot-3

 

 

Screenshot-4

 

Screenshot-5

 

Screenshot-6

 

 

 

Screenshot-7

 

 

Screenshot-8

 

 

Screenshot-9

Screenshot-10

 

 

 

 

After installation and reboot, now start the machine and Open a browser from a machine on the same network and enter the IP address of the OSSIM server in the URL field . Enter admin as the user and password to log in to the management site. Change your password under the Configuration Users section. After logging in, the main dashboard view loads

 

Screenshot-12

 

 

Screenshot-13

 

 

Screenshot-14

 

 

 

The next step is to add systems for the OSSIM server to monitor. Start by defining your local network an completes, several hosts should appear on the Hosts tab of the Policies section. OSSIM installs and auto-configures Nagios and ntop during installation, so you also can see basic network information by visiting the Monitors section of the management page

You now have an active OSSIM server using passive network monitors like snort, Nagios and ntop to report on your test network’s activity. Next, let’s add some client-based agents that feed data into the OSSIM server.

 

Screenshot-15

 

 

Screenshot-16

 

 

 

 

Installing the OSSEC Agent:


Many client agents can communicate with OSSIM, but because of space limitations, I am covering the one I believe is the most valuable to security administrators: OSSEC. OSSEC is a freely available host intrusion detection system (HIDS) maintained by Trend Micro that performs a multitude of client security tasks, such as logging, alerting, integrity checking and rootkit detection. Additionally, a large number of OSSIM plugins for OSSEC already are installed with your server that can monitor virtually any part of a UNIX/Linux/Windows system.

 

for installing OSSEC Client agent on Linux and Windows machine  follow my previous post  Installing OSSEC

 

 

After Installing OSSEC  Client agent  on your client machine, then come back to the  OSSIM Server.

 

On OSSIM server generate a record for the OSSEC agent we have just installed by running:

#/var/ossec/bin/manage_agents

choose (a)
give a name to the agent using the convention ‘linux-server-name’-ossec-agent
give the IP of the Linux server
press enter to select the default value of the ID assigned by the OSSIM server for the OSSEC agent
choose (y) to confirm selection
choose (q) to quit

 

 

On OSSIM Server generate a key for the OSSEC agent

#/var/ossec/bin/manage_agents

choose (e)
provide ID of the OSSEC agent defined above
copy the key and press (q) to quit

 

 

On Linux server register OSSIM server with OSSEC agent by

#sudo /var/ossec/bin/manage_agents

choose (i)
paste the key generated in step 10
choose (y) to confirm
press (q) to quit

 

 

#sudo nano /var/ossec/etc/ossec.conf

add line <server-ip>”IP of OSSIM server”</server-ip> within the tag <client> </client>

 

#sudo /var/ossec/bin/ossec-control stop
#sudo /var/ossec/bin/ossec-control start

 

 

Login to the OSSIM web interface

Goto Analysis → Vulnerabilities → Scan Jobs

Click a New Scan Job to define scan job for the server above

Provide IP of the server in the text box that reads: “Type here to search assets”

Click ‘New Job’ to launch the job

When the vulnerability scan is complete you can download the PDF to see the comprehensive report generated by OSSIM

 

 

The process of analyzing multiple events within a directive is called correlation. Correlation is central to OSSIM’s operation. With correlation, administrators can take data from a multitude of disparate security devices and tailor directives to reduce false positives and extrapolate threat data in real time.