Instrumentation & Measurement Magazine 25-6 - 35

ELK-Stack, we describe the data collected from one game scenario
played on the cyber range platform on 22 December by 2
players for each team. For this specific scenario, the focus is on
the Events Logs (System Logs and Security Logs) as well as the
network traffic. To this extent, logs are saved to match the objectives
of the scenario, in which a malicious actor has the goal
to infiltrate in as many networks that he/she is able.
A security event is detailed in Fig. 2, Fig. 3, Fig. 4 and Fig. 5.
Starting with a top-level overview, Fig. 2 shows a time series of
the logs over 24 hours. The red bar represents the security-related
logs which can be an indication of malicious actions, and
thus these logs require further investigation.
User autheticantion logs can show if a malicious actor is
systematically probing the system with brute force attacks to
guess the password. Fig. 3 displays the high number of failed
login attempts, from which it can be perceived that something
malicious is happening. Therefore, knowing the host's
baseline activity and the users, more investigation is used to
identify which user created the failed login attempts. These attempts
were coming from a nonregistered account, which is a
clear indicator of an attack.
Following the failed logins, an unauthorized user with
" root " permissions generates a lot of events, as depicted in Fig.
4. If the root user opens files and executes unusual commands,
it is assumed that he/she tries to scan the network using
" nmap " command. Furthermore, an unusual script called
" evil.py " is created or edited on the system.
Regarding the IP related logs, we can observe that the user
tries to change the routing configuration. As the attacker tries
to exploit the compromised machine as a stepping stone to
move into another network, he adds a routing command that
will permit him to access the 10.39.254.0/24 network, while the
traffic will be routed via 10.91.244.7 (Fig. 5).
The game scenario described here is more simplistic compared
to a real attack, as it is expected that in real life, the
attacks will be more sophisticated. Nonetheless, the game still
demonstrates the efficacy of the tools and the viability of the
approach.
Despite the fact that the demonstrated tools are suitable
for detecting malicious activity, there is another challenge that
needs to be addressed regarding the tendency towards false
positives/negatives. False positives can have multiple causes,
for example, lack of a baseline, as it is hard to determine in the
specific context what is considered as normal activity, what is
incorrectly labeled data that can affect the detection of malicious
activities and where ill-tuned alert rules are either too
specific or too broad. Therefore, ELK focuses more on the
behavior than on the tools, by configuring rules that are independent
of the data source and facilitate the detection process
for attack indicators.
Conclusion
Fig. 3. Brute force attack example.
Fig. 4. Used commands during incident.
Fig. 5. Routing command for pivoting.
September 2022
This article discusses the objectives of an SOC for monitoring
an infrastructure as well as presents the ELK-Stack
and its use in this context,
while the different
Log sources according
to their information and
priority are presented. In
addition, ELK-Stack in action
is showcased, where
a cyber incident was
able to be detected and
the attacker's intentions
were mapped. Dur ing
the game scenario, we
are able to log network
traffic, authentication attempts,
used commands,
files and accessed applications.
These logs are an
indicator of the malicious
actions to gain control
of a system by guessing
its password, and then
how it is used as a stepping
stone to attack other
IEEE Instrumentation & Measurement Magazine
35

Instrumentation & Measurement Magazine 25-6

Table of Contents for the Digital Edition of Instrumentation & Measurement Magazine 25-6

Instrumentation & Measurement Magazine 25-6 - Cover1
Instrumentation & Measurement Magazine 25-6 - Cover2
Instrumentation & Measurement Magazine 25-6 - 1
Instrumentation & Measurement Magazine 25-6 - 2
Instrumentation & Measurement Magazine 25-6 - 3
Instrumentation & Measurement Magazine 25-6 - 4
Instrumentation & Measurement Magazine 25-6 - 5
Instrumentation & Measurement Magazine 25-6 - 6
Instrumentation & Measurement Magazine 25-6 - 7
Instrumentation & Measurement Magazine 25-6 - 8
Instrumentation & Measurement Magazine 25-6 - 9
Instrumentation & Measurement Magazine 25-6 - 10
Instrumentation & Measurement Magazine 25-6 - 11
Instrumentation & Measurement Magazine 25-6 - 12
Instrumentation & Measurement Magazine 25-6 - 13
Instrumentation & Measurement Magazine 25-6 - 14
Instrumentation & Measurement Magazine 25-6 - 15
Instrumentation & Measurement Magazine 25-6 - 16
Instrumentation & Measurement Magazine 25-6 - 17
Instrumentation & Measurement Magazine 25-6 - 18
Instrumentation & Measurement Magazine 25-6 - 19
Instrumentation & Measurement Magazine 25-6 - 20
Instrumentation & Measurement Magazine 25-6 - 21
Instrumentation & Measurement Magazine 25-6 - 22
Instrumentation & Measurement Magazine 25-6 - 23
Instrumentation & Measurement Magazine 25-6 - 24
Instrumentation & Measurement Magazine 25-6 - 25
Instrumentation & Measurement Magazine 25-6 - 26
Instrumentation & Measurement Magazine 25-6 - 27
Instrumentation & Measurement Magazine 25-6 - 28
Instrumentation & Measurement Magazine 25-6 - 29
Instrumentation & Measurement Magazine 25-6 - 30
Instrumentation & Measurement Magazine 25-6 - 31
Instrumentation & Measurement Magazine 25-6 - 32
Instrumentation & Measurement Magazine 25-6 - 33
Instrumentation & Measurement Magazine 25-6 - 34
Instrumentation & Measurement Magazine 25-6 - 35
Instrumentation & Measurement Magazine 25-6 - 36
Instrumentation & Measurement Magazine 25-6 - 37
Instrumentation & Measurement Magazine 25-6 - 38
Instrumentation & Measurement Magazine 25-6 - 39
Instrumentation & Measurement Magazine 25-6 - 40
Instrumentation & Measurement Magazine 25-6 - 41
Instrumentation & Measurement Magazine 25-6 - 42
Instrumentation & Measurement Magazine 25-6 - 43
Instrumentation & Measurement Magazine 25-6 - 44
Instrumentation & Measurement Magazine 25-6 - 45
Instrumentation & Measurement Magazine 25-6 - 46
Instrumentation & Measurement Magazine 25-6 - Cover3
Instrumentation & Measurement Magazine 25-6 - Cover4
https://www.nxtbook.com/allen/iamm/26-6
https://www.nxtbook.com/allen/iamm/26-5
https://www.nxtbook.com/allen/iamm/26-4
https://www.nxtbook.com/allen/iamm/26-3
https://www.nxtbook.com/allen/iamm/26-2
https://www.nxtbook.com/allen/iamm/26-1
https://www.nxtbook.com/allen/iamm/25-9
https://www.nxtbook.com/allen/iamm/25-8
https://www.nxtbook.com/allen/iamm/25-7
https://www.nxtbook.com/allen/iamm/25-6
https://www.nxtbook.com/allen/iamm/25-5
https://www.nxtbook.com/allen/iamm/25-4
https://www.nxtbook.com/allen/iamm/25-3
https://www.nxtbook.com/allen/iamm/instrumentation-measurement-magazine-25-2
https://www.nxtbook.com/allen/iamm/25-1
https://www.nxtbook.com/allen/iamm/24-9
https://www.nxtbook.com/allen/iamm/24-7
https://www.nxtbook.com/allen/iamm/24-8
https://www.nxtbook.com/allen/iamm/24-6
https://www.nxtbook.com/allen/iamm/24-5
https://www.nxtbook.com/allen/iamm/24-4
https://www.nxtbook.com/allen/iamm/24-3
https://www.nxtbook.com/allen/iamm/24-2
https://www.nxtbook.com/allen/iamm/24-1
https://www.nxtbook.com/allen/iamm/23-9
https://www.nxtbook.com/allen/iamm/23-8
https://www.nxtbook.com/allen/iamm/23-6
https://www.nxtbook.com/allen/iamm/23-5
https://www.nxtbook.com/allen/iamm/23-2
https://www.nxtbook.com/allen/iamm/23-3
https://www.nxtbook.com/allen/iamm/23-4
https://www.nxtbookmedia.com