How to link Intrusion Detection Systems (IDS) to Open-Source INTelligence (OSINT)¤
Plan of tutorial¤
- Introduction, level, material
- Define the need, the expected result and the use case
- Specify the dashboards before the RDF models
- Build Knowledge Graphs from:
- Link IDS event to a knowledge graph in dashboards via:
“Everything as code” has become the status quo among leading organizations adopting DevSecOps and SRE practices, and yet, monitoring and observability have lagged behind the advancements made in application and infrastructure delivery for the Cyber Investigation Analysts. “Investigating as code” is not just automated installation and configuration of agents, plugins, and exporters to collect the alerts of Indicator of Compromise (IoC) — it encompasses the conception of a custom dashboard to navigate in gigabytes of event data linked to open data of Open-Source INTelligence (OSINT). However, traces and knowledge about attacks are heterogeneous due to fragmented cyber communities. This fact prevents rapid development and makes the “investigating as code” a difficult and tedious task, including cybersecurity event browsing.
This tutorial is going to demonstrate solutions that exist to browse the knowledge of an attack like on the Web with Linked Data technology. It also includes the development of new custom links between events and knowledge, ie. inferences.
This self-service monitoring/alerting and now inferencing allows analysts breaking data silos which enables by continuous improvement the linking of Intrusion Detection Systems (IDS) to Open-Source INTelligence (OSINT).
This tutorial is also suitable for beginners. Simple examples will allow you to discover Linked Data technologies.
eccenca will offer an online sandbox running an instance of Corporate Memory. You can also install Corporate Memory Control (cmemc) on your computer to test the example of bash scripts in this tutorial. For the part “Link IDS event to a knowledge graph in dashboards”, you need to have a Splunk instance where you can install the Splunk apps of this tutorial.
Next chapter: Define the need, the expected result and the use cases