• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2018
  • July
  • 4
  • SIEM – A Beginner’s Guide to Security Information and Event Management Tools

SIEM – A Beginner’s Guide to Security Information and Event Management Tools

July 4, 2018July 27, 2019 Comments Off on SIEM – A Beginner’s Guide to Security Information and Event Management Tools
how does siem work how to become siem security and information event management siem checklist SIEM – A Beginner’s Guide to Security Information and Event Management Tools what is siem

As its name suggests, the main function of a SIEM is Event management. The SIEM solution once implemented completely & effectively will have complete visibility over an organization’s network.

This helps administrators, SIEM operators to monitor network activity in their infrastructure. But interestingly, one can categorize various assets(network devices & services) so that the monitoring ability of the SIEM can be tweaked to a large extent. The SIEM tool can generate alerts & incidents based on specific co-relation rules. For eg: If a Port Scan is initiated against a system, the SIEM generates a Port Scan Alert with all details like Source & Destination, port numbers etc. This helps the organization to find incidents or hacking attempts in near-Real Time.

How the SIEM works?

You may have noticed the word “Co-Relation” in the previous paragraph. Yes, for the question How the SIEM works, the one-stop answer is a co-relation. But not that alone of course. Basically, a SIEM tool collects logs from devices present in the Organization’s infrastructure. Some solutions also collect NetFlow and even raw packets.

With the collected data(mainly logs, packets), the tool provides an insight into the happenings of the network. It provides data on each event occurring in the network and thus acts as a complete centralized security monitoring system.

In addition to this, the SIEM tool can be configured to detect specific incident. For example, a user is trying to log in to an AD server. For first 3 times the authentication failed and the 4th time it succeeded.

Now, this is an incident to look up on. There are many possibilities. Maybe a person is trying to guess the password of another user and got it right, which is a breach. Or maybe if the user forgot his password but got it right at the end and so on. This is where co-relation comes in.

For such a case, a co-relation rule can be made in such a way that, If an authentication failure event is happening 3 times consecutively followed by a success in a specific time period, then alert pops up. This can be further investigated further by analyzing the logs from respective machines. So my definition of co-relation is: “ It is the rule which aggregates events into an incident which is defined by specific application or scenario.”

How logs reach the SIEM?

Logs are fetched to the SIEM in two different ways. Agent-based & Non-Agent based. In agent-based approach, a log pushing agent is installed in the client machine from which the logs are collected. Then this agent is configured to forward logs into the solution. In the latter type, the client system sends logs on its own using a service like syslog or Windows Event Collector service etc. There are also specific applications & devices which can be integrated through a series of vendor specific procedures.

How exactly would the SIEM raise an alert?

Well, now you know that the logs from different devices are being forwarded into the SIEM. Take an example: A port scan is initiated against a specific machine. In such a case, the machine would generate a lot of unusual logs. Analysing the logs, it will be clear that a number of connection failures are occurring at different ports in regular intervals.

Seeing packet information if possible, we can detect the SYN requests being sent from the same IP to the same IP but to different ports in regular intervals. That concludes that somebody initiated an SYN scan against our asset. The SIEM automates this process and raises alerts. Different solutions do this in different ways but produce same results.

The Business impact of SIEM Solution

This is one of the topics for which long-standing discussions were conducted & still now a complete & clear solution has not yet arrived. The question is “Why to spend a huge amount of money for something which returns nothing ?” Well, what do you think about it?  Does SIEM solution give you something? Well yes! Nowadays SIEM solutions are evolving in a way, not only to protect an IT-Infrastructure but also to identify the business risks rising from the IT-Infrastructure.

Even there is a separate strategy know as GRC, the IT-Governance Risk & Compliance. This integrates & relates technological aspects of IT-security(like DOS attacks) using SIEM solutions with the business aspect(the asset being attacked & approximate loss, reporting to asset manager). Such strategies bring different departments & professionals(like SOC Operators/Managers, CISO, Financial Consultants, CXOs etc) under one dashboard. This is done by integrating different solutions together. For eg: The Alerts & incidents from SIEM is forwarded BPM(Business Process Management) solution by the CISO identifying & co-relating the technical and business impacts. Consider a simple scenario, lets’ take the same DDOs attack against an e-banking website(webserver).

The solution first identifies the attack and the Operators/Analysts report it to their manager/CISOs. The managers & CISOs dig more technical info on the nature of the attack(specs like Source country, no of sessions etc). Based on this they identify how much loss would it be if the webserver would be down for specific time(say 30mins).

Now they report the technical details, suggestions, and steps to initiate to the firewall/IDS-IPS & webserver teams. Then they report to the Senior Management & Financial Managers about the loss they would have to suffer if action is not taken.

If management is satisfied, they take a decision & give approval to the Firewall/IDS-IPS & webserver teams to take action. They would take action and the webserver would have downtime for some 5 mins only. So the webserver resources are saved but ultimately money is also saved & customer satisfaction is sustained.

So the point here is nowadays, SIEM solutions can adapt according to the way you want. This whole process described can be automated by integrating different solutions. The above scenario is only a simple case but the approach is same in all situations. At the end of the day, money is what matters, but sadly nobody still recognise the financial impact of IT-Security.

SIEM & Compliance

Apart from alerting and incident response, SIEM helps an organization in Compliance & Regulatory matters too. For all major compliance like ISO 27001, HIPAA, PCI, log retention is an important criteria. For example, in ISO27001 there is a control for Logging & Monitoring(A – 12.4), which suggests that all Event Logs, user activities, security events should be logged an archived with a proper time-stamp

The logs should also be protected from unauthorized access, tampering etc. There is a list of controls to be in place in order to be properly compliant. Here SIEM can help. As said earlier, the siem tool collects logs from different devices and keeps them in its reserves.

So it can act as a centralized log collecting server. Plus, the tool keeps all the logs with proper time-stamps, and archives it to it’s bulk storage with no loss of integrity. So this helps with the controls in various standards.

Conclusion

To wrap up, there are a whole lot of benefits by implementing a SIEM solution in an Enterprise. But sadly many organizations consider the SIEM a waste of money.

But, it is because they are not realizing the fact that SIEM can not only protect your network & assets but also your business. Plus nowadays, you can integrate almost anything into the SIEM tool like servers, custom applications, network devices, end-user devices, smartphones, management & collaboration solutions etc. This gives the concerned personnel, a clear view of the insights of their own organization.

They can have an overview of their own system and they can keep on changing for better results. Even some siems have malware analysis capabilities, vulnerability assessment functionalities which makes it a centralized security server providing multiple functions simultaneously.

Post navigation

How To Hack Instagram Account 2018
Vulnerator – The Vulnerability Parsing Utility

Related Articles

DeTTecT – Detect Tactics, Techniques & Combat Threats

- Incident Response
October 15, 2019

DumpsterFire Toolset – Security Incidents In A Box!

- Incident Response
October 4, 2019

SysmonX – An Augmented Drop-In Replacement of Sysmon

- Incident Response
September 6, 2019
hacker gadgets
hacker phone covers

Recent Posts

Tracgram - Use Instagram Location Features To Track An Account

Tracgram – Use Instagram Location Features To Track An Account

March 22, 2023
CVE-Vulnerability-Information-Downloader - Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And Combines Them Into One List

CVE-Vulnerability-Information-Downloader – Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And Combines Them Into One List

March 22, 2023
SXDork - A Powerful Tool That Utilizes The Technique Of Google Dorking To Search For Specific Information On The Internet

SXDork – A Powerful Tool That Utilizes The Technique Of Google Dorking To Search For Specific Information On The Internet

March 21, 2023
Invoke-PSObfuscation - An In-Depth Approach To Obfuscating The Individual Components Of A PowerShell Payload Whether You'Re On Windows Or Kali Linux

Invoke-PSObfuscation – An In-Depth Approach To Obfuscating The Individual Components Of A PowerShell Payload Whether You’Re On Windows Or Kali Linux

March 21, 2023
IpGeo - Tool To Extract IP Addresses From Captured Network Traffic File

IpGeo – Tool To Extract IP Addresses From Captured Network Traffic File

March 21, 2023
APKHunt - Comprehensive Static Code Analysis Tool For Android Apps That Is Based On The OWASP MASVS Framework

APKHunt – Comprehensive Static Code Analysis Tool For Android Apps That Is Based On The OWASP MASVS Framework

March 21, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW