IDS/IPS monitoring and security using EventLog Analyzer
Intrusion detection systems and intrusion prevention systems (IDS/IPS) act as vigilant guardians of network traffic from malicious attacks. Their logs offer invaluable insights into attack tactics. ManageEngine EventLog Analyzer centralizes this data, providing comprehensive analysis and actionable reports to protect against such attacks.
This tutorial elaborates on the different IDS/IPS monitoring and security use cases covered by EventLog Analyzer. Please ensure logging is enabled for your IDS/IPS for the syslogs to be forwarded to Eventlog Analyzer.
Threat detection using EventLog Analyzer: Use cases
EventLog Analyzer covers the IDS/IPS security use cases below with its security auditing reports and alerts. These reports are predefined and can be scheduled to be generated at specific times and distributed over email.
Use Case | Description | Why implement? | Available Reports |
---|---|---|---|
Detecting IP spoofing in SonicWall devices | IP spoofing is a type of attack where a malicious actor disguises their IP address to appear as if they are coming from a different source. This allows them to bypass security measures that are based on IP address filtering. | Detecting IP spoofing can help prevent attackers attempting to bypass firewalls and other security measures that rely on IP address-based filtering. | To detect IP spoof attacks, customize the Critical Attack predefined alert profile by adding an additional filter criteria "Intrusion Name" containing "Spoof". This will enable accurate detection and notifications for such attacks.
To analyze the attack incident, filter out IP Spoof from the Intrusion Name column in the Critical Attacks report. |
Detecting land attacks in Cisco devices | Land attacks are a type of denial of service (DoS) attack where a malicious actor sends a large number of packets to a target system with the same source and destination IP address and port. This can overwhelm the system and cause it to crash or become unresponsive. | Detecting land attacks enables organizations to proactively identify and mitigate threats such as DoS and network disruptions. | To detect land attacks, customize the All Attacks predefined alert profile by adding an additional filter criterion "Attack Name" containing "Land". This will enable accurate detection and notifications for such attacks.
To analyze the attack incident, filter out Land from the Attack Name column in the All Attacks report. |
Detecting URL filtering log intrusions in PaloAlto devices | URL filtering log intrusion attacks occur when malicious actors attempt to bypass URL filtering rules implemented on a Palo Alto firewall. | By detecting URL filtering logs, organizations can proactively identify and mitigate threats associated with unauthorized web access, malware downloads, and data exfiltration. | To detect URL filtering log attacks, customize the Possible Attacks predefined alert profile by adding an additional filter criterion "Intrusion Name" containing "URL filtering log". This will enable accurate detection and notifications for such attacks.
To analyze the attack incident, filter out URL Filtering Log from the Intrusion Name column in the Possible Attacks report. |
Detecting IPv4 source route attacks in WatchGuard devices | An IPv4 source route attack is a type of network attack where a malicious actor manipulates the source route field in an IP packet header to force the packet to follow a specific path through the network. This can be used to bypass security measures, launch DoS attacks, or intercept and modify network traffic. | By detecting IPv4 source route attacks, organizations can protect against DoS attacks launched using source route techniques. | To detect IPv4 source route attacks, customize the All Attacks predefined alert profile by adding an additional filter criterion “Intrusion Name” containing “IPv4 source route”. This will enable accurate detection and notifications for such attacks.
To analyze the attack incident, filter out IPv4 source route from the Intrusion Name column in the All Attacks report. |
Detecting spyware download detections in PaloAlto devices | Spyware is malicious software that secretly monitors user activity and collects personal information without the user's knowledge or consent. | By effectively detecting spyware downloads, organizations can protect their devices, data, and users from the harmful effects of this type of malware. | To detect spyware downloads, customize the Possible Attacks predefined alert profile by adding an additional filter criterion “Intrusion Name” containing “Spyware download detection”. This will enable accurate detection and notifications for such attacks. To analyze the attack incident, filter out Spyware Download Detection from the Intrusion Name column in the Possible Attacks report. |
Detecting port scanning attacks in NetScreen devices | Port scanning is a technique used by attackers to identify open ports on a network device. By scanning a device's ports, attackers can determine which services are running and potentially exploit vulnerabilities in those services. | By detecting port scanning attempts, organizations can identify vulnerabilities in their network infrastructure and take steps to address them. | To detect port scanning attacks, customize the Possible Attacks predefined alert profile by adding an additional filter criterion “Intrusion Name” containing “Port scan". This will enable accurate detection and notifications for such attacks.
To analyze the attack incident, filter out Port Scan from the Intrusion Name column in the Possible Attacks report. |
Detecting SSH brute force login attempts in FirePower devices | An SSH brute force login attempt is a type of attack where a malicious actor tries to gain unauthorized access to a system by repeatedly guessing the correct username and password combination. This is done by using automated tools to test various combinations of usernames and passwords until the correct credentials are found. | Successful SSH brute force attacks can grant attackers unauthorized access to systems, allowing them to steal data, install malware, or launch further attacks. By detecting these attempts, organizations can protect their systems from unauthorized access and other security threats. | To detect SSH brute force login attempts, customize the Possible Attacks predefined alert profile by adding an additional filter criterion “Attack” containing “SSH brute force login attempt”. This will enable accurate detection and notifications for such attacks.
To analyze the attack incident, filter out BAD-TRAFFIC SSH brute force login attempt from the Attack column in the Possible Attacks report. |
Detecting SSL enforcement violations in CheckPoint devices | SSL Enforcement Violation occurs when a network device attempts to establish an SSL/TLS connection that violates the firewall's configured policies. | Detecting SSL enforcement violations can help organizations prevent unauthorized access, data breaches, and man-in-the-middle attacks. | To detect SSL enforcement violations, customize the Critical Attacks predefined alert profile by adding an additional filter criterion “Attack” contains “SSL enforcement violation”. This will enable accurate detection and notifications for such attacks.
To analyze the attack incident, filter out SSL Enforcement Violation from the Attack column in the Critical Attacks report. |
Detecting bad TCP checksum in F5 devices | A bad transmission control protocol (TCP) checksum signals a transmission error, indicating that a packet's data has been corrupted during transit. | Malicious actors may intentionally send packets with bad checksums to disrupt network traffic or launch attacks. Detecting bad TCP checksums can help organizations detect and mitigate these threats. | To detect bad TCP checksum, customize the All Attacks predefined alert profile by adding an additional filter criterion “Intrusion Name” contains “Bad TCP checksum”. This will enable accurate detection and notifications for such attacks.
To analyze the attack incident, filter out Bad TCP Checksum from the Intrusion Name column in the All Attacks report. |
Supported IDS/IPS vendors:
- Cisco
- Sophos
- Barracuda
- SonicWall
- Fortinet
- Juniper
- PaloAlto
- WatchGuard
- Huawei
- NetScreen
- CheckPoint
- pfSense
- F5
- Cisco FirePower
- H3C
- Stormshield
- ForcePoint
Compliance use cases
Compliance requirement to solution mapping | |||
---|---|---|---|
EventLog Analyzer reports and alerts | Regulations | Requirements | |
|
FISMA |
|
|
PCI-DSS | Securing applications and systems: PCI-DSS requirements 6.6 | ||
SOX |
|
||
HIPAA |
|
||
GLBA |
|
||
ISO 27001:2013 |
|
||
GPG | Suspicious Activity at The Boundary (PMC Rule 3) | ||
GDPR |
|
||
NRC |
|
||
Cyber essentials | Boundary firewalls and internet gateways | ||
COCO | 1.D.Protective monitoring and intrusion detection | ||
NERC |
|
||
PDPA |
|
||
NIST CSF | Risk Assessment (ID.RA) | ||
CMMC |
|
||
POPIA | Chapter 3 - Section 22 (5) (a) | ||
QCF |
|
||
TISAX | To what extent is the network of the organization managed?: 5.2.7 | ||
SAMA |
|
||
ECC |
|
||
PDPL |
|
||
UAE-NESA |
|
||
SOC 2 | Configuration and policy monitoring, malware detection, compromise detection: 6.8.04 | ||
LGPD |
|