Log Analysis & Continuous Security Monitoring

  • Event Logs

    • Windows

      • Application

      • Security

      • System

      • Setup

      • Forwarded

    • Severity (Windows Scale):

      • Information

      • Warning

      • Error

      • Audit success/failure

    • Linux

      • Text files in /var/log/*

      • Systemd uses journalctl (binary)

    • MacOS

      • “Console” app

      • Also test logs, just like Linux

    • Log Analysis

      • Correlation of events

      • Configuration changes

      • Gaps in time

      • Trend analysis

    • Syslog

      • Old protocol, UDP 514

      • No built in security

      • Newer versions: security, TCP 1468

      • Log archiving.

      • Structure:

        • Header: timestamp, IP address

        • Facility

        • Severity

        • Message

    • Firewall Logs

      • Source of information for devices involved in security incidents.

      • Log traffic permitted or dropped.

      • Statistics

      • Centralized storage recommended

    • Proxy logs

      • Forward proxies

        • Outbound traffic

        • Transparent

        • Non-transparent

      • Reverse proxies

        • Inbound traffic

        • Load balancers, basically.

        • Look for malicious requests

    • Web Application Firewall (WAF) Logs

      • A WAF scans application level (web) requests for intrusion attempts

      • Logs suspicious and malicious attempts for:

        • Malformed inputs

        • SQLi

        • Buffer overflows

        • Brute force logins

        • XML, JSON injection attempts

        • XSS, CSRF

    • IDS/IPS Logs

      • An intrusion detection/prevention device uses signatures to match suspicious traffic.

      • Can generate a lot of logging activity

      • Require rule tweaking

      • Alerts ingested in SIEM

Last updated