Build an information security visualization platform by yourself (Part Two) Missle Map

0 24
Series of articlesBuild an information security visualization platform by yourse...

Series of articles

Build an information security visualization platform by yourself

Continued article 1, Xiao Z introduced the most basic asset module, which has basically completed the simplest process from data input to visualization presentation. As shown in the figure below, Splunk supports almost all places that can generate data.

Build an information security visualization platform by yourself (Part Two) Missle Map

Subsequent articles will introduce several ways to connect to the platform and simple visualization effects and security scenarios, and this article introduces the construction process of Missle Map.

Syslog is supported by many devices, let's take this one for a test. As a visualization platform, Xiao Z thought ofhttps://www.fireeye.com/cyber-map/threat-map.htmlCan we try to implement a similar dynamic effect? This is slightly more complex than the asset module.

Scenario, server external connection

1. Scenario description: Servers allow external connections for various reasons, which is a big risk point for internal network security.

2. Data source: Exit load balancing syslog

3. App plugin:https://splunkbase.splunk.com/app/3511/

4. Configuration process: Parsing process

Create a new index: Settings - Index - Create Index - Enter the index name ad

Configure syslog: Each device is more or less the same, configure the IP of the log server and the port number for log collection, here using UDP

Configure data input UDP new, here set the UDP port 578 as the port to receive syslog

Index selection: ad is used to receive syslog from the exit load balancer

Search for the keyword filter with index=ad

After importing, the original data format is automatically filtered out to obtain the original data

How to present the data? Assuming that the missle map app has been installed, refer to the grammar rules of missle map

Grammar rules

start_lat starts

你可能想看:

Build an information security visualization platform with your own hands

2. The International Criminal Police Organization arrests more than 1,000 network criminals from 20 countries, seize 27 million US dollars

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Building a test environment requires caution! What points should be paid attention to before and after building it?

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

A Brief Discussion on the Establishment of Special Security Management Organizations for Operators of Key Information Infrastructure

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

Bubba AI launches open-source compliance platform Comp AI, helping 100,000 startups achieve security compliance

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

最后修改时间:
admin
上一篇 2025年03月27日 16:49
下一篇 2025年03月27日 17:12

评论已关闭