All Projects → openbsm → bsmtrace

openbsm / bsmtrace

Licence: other
BSM based intrusion detection system

Programming Languages

c
50402 projects - #5 most used programming language
Yacc
648 projects
Roff
2310 projects
Lex
420 projects

Projects that are alternatives of or similar to bsmtrace

Fail2ban
Daemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+21438.71%)
Mutual labels:  ids, intrusion-detection
Wazuh
Wazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+10074.19%)
Mutual labels:  ids, intrusion-detection
Wazuh Chef
Wazuh - Chef cookbooks
Stars: ✭ 9 (-70.97%)
Mutual labels:  ids, intrusion-detection
Security Onion
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+9435.48%)
Mutual labels:  ids, intrusion-detection
Wazuh Kibana App
Wazuh - Kibana plugin
Stars: ✭ 212 (+583.87%)
Mutual labels:  ids, intrusion-detection
NIDS-Intrusion-Detection
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (+45.16%)
Mutual labels:  ids, intrusion-detection
Snort Rules
An UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (+335.48%)
Mutual labels:  ids, intrusion-detection
Wazuh Ruleset
Wazuh - Ruleset
Stars: ✭ 305 (+883.87%)
Mutual labels:  ids, intrusion-detection
Wazuh Docker
Wazuh - Docker containers
Stars: ✭ 213 (+587.1%)
Mutual labels:  ids, intrusion-detection
Pi.alert
WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+574.19%)
Mutual labels:  ids, intrusion-detection
Teler
Real-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+3925.81%)
Mutual labels:  ids, intrusion-detection
wazuh-ansible
Wazuh - Ansible playbook
Stars: ✭ 166 (+435.48%)
Mutual labels:  ids, intrusion-detection
Py Idstools
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (+561.29%)
Mutual labels:  ids, intrusion-detection
wazuh-packages
Wazuh - Tools for packages creation
Stars: ✭ 54 (+74.19%)
Mutual labels:  ids, intrusion-detection
TheBriarPatch
An extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-32.26%)
Mutual labels:  ids, intrusion-detection
suspicious login
Detect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (+45.16%)
Mutual labels:  intrusion-detection
pg credereum
Prototype of PostgreSQL extension bringing some properties of blockchain to the relational DBMS
Stars: ✭ 52 (+67.74%)
Mutual labels:  audit
vagrant-ids
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-32.26%)
Mutual labels:  intrusion-detection
pyHIDS
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (+0%)
Mutual labels:  intrusion-detection
Audit-Test-Automation
The Audit Test Automation Package gives you the ability to get an overview about the compliance status of several systems. You can easily create HTML-reports and have a transparent overview over compliance and non-compliance of explicit setttings and configurations in comparison to industry standards and hardening guides.
Stars: ✭ 37 (+19.35%)
Mutual labels:  audit

BSMtrace

Build Status

Introduction

BSMtrace is a utility that processes audit trails, or real-time audit feeds provided by audit pipes. It loads a set of finite state machines or sequences from the supplied configuration file and watches the audit streams for instances of these sequences. For more information, the example bsmtrace.conf file should be reviewed.

The underlying premise behind bsmtrace is that the user can specify sequences of events that are common after or during system compromise. These might include things like:

  • A subject having 50 failed, then one successful login over the course of a week. Something you might expect to find during an SSH brute force.

  • User "nobody" creating files outside of /usr/local/www

  • User "nobody" executing administrative utilities, or utilities like id(1) to determine which level of privilege has been acquired

  • Detect the execution of common shellcode where certain sequences don't normally appear, for example, the typical execution pattern of bind when it services a DNS request might be:

  [1] recvmsg(2)
  [2] sendmsg(2)

  [1] recvmsg(2)
  [2] sendmsg(2)

  .
  .
  .

When the return address of the stack is over-written during a buffer overflow attack, the execution pattern of the process will change, resulting in the execution of system calls outside it's regular sequence:

  [1] recvmsg
      o buffer overflow is exploited, and now the execution pattern might look
        something like this:
  [2] socket
  [3] bind
  [4] listen
  [5] accept
  [6] dup2
  [7] exec
  • Users or groups of users executing utilities, looking at (or attempting) files they shouldn't be.

Because bsmtrace acquires it's information from the audit stream, we can be reasonably certain that we can trust the data. Unlike syslog, the BSM audit framework targets Commmon Criteria (CC) requirements, to help ensure that the audit trail is robust, protected and maintains high levels of integrity.

For more information on the security auditing framework see:

TrustedBSD

A complete EBNF specification (bsmtrace.ebnf) for the policy configuration engine has been included with this source code archive.

Building

Currently, we BSMtrace is built using a basic Makefile. As more platforms are supported, this might change. Currently libpcre is required as a build dep.

On OS X you can install it using home brew

	% brew install pcre

Or on FreeBSD, you can use ports or pkg to install it. Then:

	% make

To install:

	% make install

Contributors

The following organizations and individuals have contributed to the development of BSMtrace (in alphabetical order):

  • Aaron L. Meihm
  • Christian S.J. Peron
  • Kyle Evans
  • Mak Kolybabi
  • Marius Halden
  • Modirum MDPay
  • Seccuris Labs

Bugs

Please report any bugs or comments to:

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].