Security monitoring tool system using threat intelligence vs threat hunting

This project is about developing a Security Monitoring Tool System using Graylog SIEM (Security Information Event Management) with a combination of Threat Intelligence and an expected outcome for Threat Hunting results. This is built in accordance to specific ruleset been made for threat hunting...

Full description

Saved in:
Bibliographic Details
Main Author: Wan Ikbal Ismat Wan Kamal,
Format: Monograph
Published: Open University Malaysia 2021
Subjects:
Online Access:http://library.oum.edu.my/repository/1435/1/library-document-1435.pdf
http://library.oum.edu.my/repository/1435/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.oum.1435
record_format eprints
spelling my.oum.14352022-06-30T03:34:41Z Security monitoring tool system using threat intelligence vs threat hunting Wan Ikbal Ismat Wan Kamal, QA75 Electronic computers. Computer science This project is about developing a Security Monitoring Tool System using Graylog SIEM (Security Information Event Management) with a combination of Threat Intelligence and an expected outcome for Threat Hunting results. This is built in accordance to specific ruleset been made for threat hunting purposes with an automation of logs from Windows endpoint host and Network activity. A datasets of Threat Intelligence enrichment will be integrated to the provided platform which is Graylog. Main objective is to ensure Security Analyst or Network Analyst to have a look at any suspicious behavior of attacks by hackers and act to it in a timely manner. Most organizations normally ingesting network and endpoint logs to the SIEM tools and integrating with some commercial tools to detect or trigger anomalies and directly send them notifications via email or 3rd party channel like Slack channel. Bear in mind that, the commercial tools is highly expensive and not really cost effective, however with this development definitely will help them to deploy the same approach with very limited budget or could be at zero cost for small medium enterprise but for big enterprise it will only cost $1500 at fixed price which considered as cheaper than the other tools. There are many developments out there whereby they are using wellknown open-source IDS like Suricata and open source SIEM like elastic stack comprises of Elasticsearch, Kibana and Logstash. However, in this development, Graylog been used with the usage of Elasticsearch and MongoDB as a database server and to store, search and analyze huge volumes of data ingested. Generally, the Graylog is introduced as a powerful logging tool with a simple user-friendly interface visualized with Grafana as well as offering minimal effort to configure with very low maintenance. Due to that, creating a ruleset for Threat Hunting and Threat Intelligence enrichment, it will be much easier to configure and straight forward to compare with other competitors in the market. (Abstract by author) Open University Malaysia 2021 Monograph NonPeerReviewed text http://library.oum.edu.my/repository/1435/1/library-document-1435.pdf Wan Ikbal Ismat Wan Kamal, (2021) Security monitoring tool system using threat intelligence vs threat hunting. Project Report. Open University Malaysia. (Submitted) http://library.oum.edu.my/repository/1435/
institution Open University Malaysia
building OUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Open University Malaysia
content_source OUM Knowledge Repository
url_provider http://library.oum.edu.my/repository/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Wan Ikbal Ismat Wan Kamal,
Security monitoring tool system using threat intelligence vs threat hunting
description This project is about developing a Security Monitoring Tool System using Graylog SIEM (Security Information Event Management) with a combination of Threat Intelligence and an expected outcome for Threat Hunting results. This is built in accordance to specific ruleset been made for threat hunting purposes with an automation of logs from Windows endpoint host and Network activity. A datasets of Threat Intelligence enrichment will be integrated to the provided platform which is Graylog. Main objective is to ensure Security Analyst or Network Analyst to have a look at any suspicious behavior of attacks by hackers and act to it in a timely manner. Most organizations normally ingesting network and endpoint logs to the SIEM tools and integrating with some commercial tools to detect or trigger anomalies and directly send them notifications via email or 3rd party channel like Slack channel. Bear in mind that, the commercial tools is highly expensive and not really cost effective, however with this development definitely will help them to deploy the same approach with very limited budget or could be at zero cost for small medium enterprise but for big enterprise it will only cost $1500 at fixed price which considered as cheaper than the other tools. There are many developments out there whereby they are using wellknown open-source IDS like Suricata and open source SIEM like elastic stack comprises of Elasticsearch, Kibana and Logstash. However, in this development, Graylog been used with the usage of Elasticsearch and MongoDB as a database server and to store, search and analyze huge volumes of data ingested. Generally, the Graylog is introduced as a powerful logging tool with a simple user-friendly interface visualized with Grafana as well as offering minimal effort to configure with very low maintenance. Due to that, creating a ruleset for Threat Hunting and Threat Intelligence enrichment, it will be much easier to configure and straight forward to compare with other competitors in the market. (Abstract by author)
format Monograph
author Wan Ikbal Ismat Wan Kamal,
author_facet Wan Ikbal Ismat Wan Kamal,
author_sort Wan Ikbal Ismat Wan Kamal,
title Security monitoring tool system using threat intelligence vs threat hunting
title_short Security monitoring tool system using threat intelligence vs threat hunting
title_full Security monitoring tool system using threat intelligence vs threat hunting
title_fullStr Security monitoring tool system using threat intelligence vs threat hunting
title_full_unstemmed Security monitoring tool system using threat intelligence vs threat hunting
title_sort security monitoring tool system using threat intelligence vs threat hunting
publisher Open University Malaysia
publishDate 2021
url http://library.oum.edu.my/repository/1435/1/library-document-1435.pdf
http://library.oum.edu.my/repository/1435/
_version_ 1738513534633902080
score 13.211869