As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and technologies that must be used to build the SOC. Based on industry experience below, technologies can be used to build an appropriate SOC to monitor threats and detect anomaly to safeguard the company.
Mainly, since most attacks come from outside, it is very important to use proper controls at the network perimeter. By using open source products, we can reduce the cost of the product and support is not a must-have.
1. IDS / IPS: Snort
The intrusion detection system is very important and is required to monitor traffic to identify or detect anomaly and attacks. Snort is one of the open source network-based intrusion detection/prevention systems that can perform real-time traffic analysis with packet logging on Internet protocol networks. Snort has 5 important components that help detect attacks.
- Packet decoder
- Detection engine
- Registration and alert system
- Output modules
Using the above components, Snort can detect network-based attacks or probes, including operating system fingerprinting attempts, semantic URL attacks, buffer overflows, SMBs (Server Message Blocks), and stealth port scanning. It can also detect attacks on web applications such as SQL injections.
Since Snort is only an engine, it requires GUI for ease of use if you are not very familiar with the command line, so it is good to set up Snorby and also requires a normal web server application such as Apache.
Part of Snort's value is that it can be configured in three separate modes: as a network sniffer, packet logger, or full IDS. As such, it can be the core of an automated security system or a component that sits alongside an array of commercial products.
2. Vulnerability Scanner (OpenVAS)
To be a proactive type of security, it is very important to have a vulnerability scanner to analyze and confirm if any asset is running with critical vulnerabilities that can lead to a breach or security attack. The Vulnerability Scanner is a product that has several updated scripts that are useful for identifying vulnerabilities in the system or applications. Periodically scan systems, especially external systems or systems connected to the Internet, and patch them regularly.
Tip: For each update or deployment, it is mandatory to ensure that all systems or applications have patches for existing vulnerabilities.
There are several open source tools with limited licenses, such as OpenVAS. Regular NVT updates are useful for detecting emerging vulnerabilities.
The OpenVAS engine can be used with the Greenbone and Barnyard GUI database to complete results in the user interface. You can scan the entire system on the network and it is good to have an authenticated scan with domain credentials. Greenbone offers options for creating credentials, hosts, tasks and schedules in the user interface. For details, see http://openvas.org/
Nagios monitors the network: Infrastructure, traffic, and attached servers all fall within the reach of its basic or extended capabilities. As with many other open source packages, Nagios is available in both free and commercial versions.
Nagios Core is the heart of the open source project, based on the free, open source version. Individual products can be monitored, and individual tasks can be performed, by plug-ins; there are roughly 50 "official" plug-ins developed by Nagios and more than 3,000 plug-ins contributed by the community.
Nagios's user interface can be modified through a front end for the desktop, web, or mobile platform, and configuration can be managed through one of the available config tools.
Maltego is proprietary software used for open source intelligence and forensic analysis, developed by Paterva. Maltego focuses on providing a library of transformations for the discovery of open source data and visualizing that information in a graphical format, suitable for link analysis and data mining.
Vega es un escáner de seguridad web y una plataforma de prueba de seguridad web gratuita y de código abierto para probar la seguridad de las aplicaciones web. Vega puede ayudarlo a encontrar y validar la inyección SQL, la secuencia de comandos entre sitios (XSS), la información confidencial revelada inadvertidamente y otras vulnerabilidades. Está escrito en Java, basado en GUI, y se ejecuta en Linux, OS X y Windows.
If you need to test your enterprise network for resistance to man-in-the-middle attacks (MITM), then Ettercap is the tool for you. This program has been doing one thing – launching MITM attacks – since its initial release in 2001.
Ettercap has four basic modes of attack: IP-based, MAC-based, and two ARP-based strategies. You can decide which type of vulnerabilities to explore and look for how your environment responds to each.
In the process of scanning for a testing attack, Ettercap can provide a great deal of information about the network and its devices. As part of an overall security toolkit, Ettercap provides strong capabilities for MITM attacks and solid augmentation for analysis and visibility functions.
7. HoneyNetToday, attackers become smarter every day, so it's good to have Honeynet to see and analyze the attack patterns that attackers try to know and defend. It is a very important technology that is mandatory to deceive the attacker and safeguard the assets. You can use Honeynet as internal or external honeynet depending on the requirement. Simply mimic the services used to prevent actual attacks. HoneyNet has mainly 4 components, as mentioned below.
Nova user interface.
For more details on Honeynet, see https://www.honeynet.org/
8. Infection Monkey
Infection Monkey is a rather comprehensive testing tool designed to show you what can happen inside your network if an attacker is successful in breaching the perimeter. Developed and supported by GuardiCore, Infection Monkey is free and fully functioned.
The user interface is among Infection Monkey's notable features. While some open source security projects provide minimalist UIs or depend on plug-ins or skins for a GUI, Infection Monkey has a GUI that is on par with many commercial software tools.
Source code for Infection Monkey is available on GitHub, with an active developer community around the project. Other tools are critical for probing your defenses for breach vulnerabilities; Infection Monkey can show you why you should strengthen your entire infrastructure.
Many options exist for testing security on traditional networks. However, testing specific security issues that can accrue to software-defined networks (SDNs) is a still-developing field – and that's why Delta is important.
A project of the Open Networking Foundation (ONF), Delta looks for potential issues in an SDN and then probes the issues to help determine how exploitable they are. With a built-in fuzzing capability, Delta is designed to probe for the existence of both known and unknown network vulnerabilities.
Built on the foundation of previous ONF projects Florence and Poseidon, Delta's code and executables are available on GitHub and are still undergoing rapid development.
Lynis is a tool that makes lists — lists of the applications and utilities it finds on Unix-based systems, lists of the versions of those systems, and lists of the vulnerabilities it finds in either the code or the configurations of each one.
With source code available on GitHub, Lynis has an active development community, with primary support coming from its creator, Cisofy. One of the special capabilities of Lynis is that, because of its Unix foundation, it is able to perform scanning and evaluation of popular IoT development boards, including the Raspberry Pi.Technology vector created by macrovector_official - www.freepik.com
Licenciada en Bellas Artes y programadora por pasión. Cuando tengo un rato retoco fotos, edito vídeos y diseño cosas. El resto del tiempo escribo en MA-NO WEB DESIGN AND DEVELOPMENT.
Security of Internet providers: can we trust it?
This year has been a time of many changes. Now, more people are connected to the Internet through their home routers for teleworking, shopping, or leisure. This is where the…
Brief History of Biometric Authentication
These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your…
Double VPN: what it is and how it works
Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had…
Browse safely and privately from your mobile phone using a VPN
Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to…
How to create the perfect hacker-proof password
We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in…
7 Most Effective Ways to Make Money From Photography
Many people all over the world enjoy photography. At first, it may seem difficult to learn, but once you turn it into a hobby, then it becomes a pleasure rather…
How to Stay Safe When Shopping Online
It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet.…
The worst 50 passwords of 2019
Despite all the security flaws, data leaks or privacy risks, the vast majority of people still use things like "123456" for their password. Darlings, it's time to take security a little…
A Guide to Integrate Social Media into Your E-Commerce Store
There’s no disputing the influence that the internet and social media have had on business management. The speed at which platforms like Facebook, Instagram, and Twitter have grown has been…
How To Take Your Website Up A Notch
In order to get your website off the ground then you’re going to want to learn how best to get it noticed and clicked on. If you’re just starting to…
Best apps to boost your social media
Most individuals, marketers and business people struggle to get the best out of social media but do not know how to go about it. There are various applications that can…
How to Become a Leader in The Field of Digital Technology
Have you been working your way up the ladder of a digital technology company but have hit a brick wall? If so, you are not alone. Many digital technology companies…