Skip to content

Commit 5228181

Browse files
Merge pull request #253349 from halkazwini/nw-open2
Freshness
2 parents b8bd372 + 9fcb71b commit 5228181

File tree

1 file changed

+21
-34
lines changed

1 file changed

+21
-34
lines changed

articles/network-watcher/network-watcher-intrusion-detection-open-source-tools.md

Lines changed: 21 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,37 +1,34 @@
11
---
2-
title: Perform network intrusion detection with open source tools
2+
title: Perform network intrusion detection using open source tools
33
titleSuffix: Azure Network Watcher
4-
description: This article describes how to use Azure Network Watcher and open source tools to perform network intrusion detection
4+
description: Learn how to use Azure Network Watcher and open source tools to perform network intrusion detection.
55
services: network-watcher
6+
ms.author: halkazwini
67
author: halkazwini
7-
ms.assetid: 0f043f08-19e1-4125-98b0-3e335ba69681
88
ms.service: network-watcher
99
ms.topic: how-to
10-
ms.workload: infrastructure-services
11-
ms.date: 09/15/2022
12-
ms.author: halkazwini
13-
ms.custom: engagement-fy23
10+
ms.date: 09/29/2023
1411
---
1512

16-
# Perform network intrusion detection with Network Watcher and open source tools
13+
# Perform network intrusion detection using Azure Network Watcher and open source tools
1714

18-
Packet captures are a key component for implementing network intrusion detection systems (IDS) and performing Network Security Monitoring (NSM). There are several open source IDS tools that process packet captures and look for signatures of possible network intrusions and malicious activity. Using the packet captures provided by Network Watcher, you can analyze your network for any harmful intrusions or vulnerabilities.
15+
Packet captures are a key component for implementing network intrusion detection systems (IDS) and performing network security monitoring (NSM). There are several open source IDS tools that process packet captures and look for signatures of possible network intrusions and malicious activity. Using the packet captures provided by Azure Network Watcher, you can analyze your network for any harmful intrusions or vulnerabilities.
1916

20-
One such open source tool is Suricata, an IDS engine that uses rulesets to monitor network traffic and triggers alerts whenever suspicious events occur. Suricata offers a multi-threaded engine, meaning it can perform network traffic analysis with increased speed and efficiency. For more details about Suricata and its capabilities, visit their website at https://suricata.io/.
17+
One such open source tool is Suricata, an IDS engine that uses rulesets to monitor network traffic and triggers alerts whenever suspicious events occur. Suricata offers a multi-threaded engine to perform network traffic analysis with increased speed and efficiency. For more details about Suricata and its capabilities, visit their website at https://suricata.io/.
2118

2219
## Scenario
2320

2421
This article explains how to set up your environment to perform network intrusion detection using Network Watcher, Suricata, and the Elastic Stack. Network Watcher provides you with the packet captures used to perform network intrusion detection. Suricata processes the packet captures and trigger alerts based on packets that match its given ruleset of threats. These alerts are stored in a log file on your local machine. Using the Elastic Stack, the logs generated by Suricata can be indexed and used to create a Kibana dashboard, providing you with a visual representation of the logs and a means to quickly gain insights to potential network vulnerabilities.
2522

26-
![simple web application scenario][1]
23+
:::image type="content" source="./media/network-watcher-intrusion-detection-open-source-tools/figure1.png" alt-text="Diagram shows a simple web application scenario.":::
2724

2825
Both open source tools can be set up on an Azure VM, allowing you to perform this analysis within your own Azure network environment.
2926

3027
## Steps
3128

3229
### Install Suricata
3330

34-
For all other methods of installation, visit https://suricata.readthedocs.io/en/suricata-5.0.2/quickstart.html#installation
31+
For all other methods of installation, see [Suricata installation quickstart guide](https://suricata.readthedocs.io/en/suricata-5.0.2/quickstart.html#installation)
3532

3633
1. In the command-line terminal of your VM run the following commands:
3734

@@ -45,7 +42,7 @@ For all other methods of installation, visit https://suricata.readthedocs.io/en/
4542
4643
### Download the Emerging Threats ruleset
4744
48-
At this stage, we do not have any rules for Suricata to run. You can create your own rules if there are specific threats to your network you would like to detect, or you can also use developed rule sets from a number of providers, such as Emerging Threats, or VRT rules from Snort. We use the freely accessible Emerging Threats ruleset here:
45+
At this stage, we don't have any rules for Suricata to run. You can create your own rules if there are specific threats to your network you would like to detect, or you can also use developed rule sets from a number of providers, such as Emerging Threats, or VRT rules from Snort. We use the freely accessible Emerging Threats ruleset here:
4946
5047
Download the rule set and copy them into the directory:
5148
@@ -73,7 +70,7 @@ While the logs that Suricata produces contain valuable information about what's
7370
7471
#### Install Elasticsearch
7572
76-
1. The Elastic Stack from version 5.0 and above requires Java 8. Run the command `java -version` to check your version. If you do not have Java installed, refer to documentation on the [Azure-supported JDKs](/azure/developer/java/fundamentals/java-support-on-azure).
73+
1. The Elastic Stack from version 5.0 and above requires Java 8. Run the command `java -version` to check your version. If you don't have Java installed, refer to documentation on the [Azure-supported JDKs](/azure/developer/java/fundamentals/java-support-on-azure).
7774
7875
1. Download the correct binary package for your system:
7976
@@ -241,51 +238,41 @@ For this article, we have provided a sample dashboard for you to view trends and
241238
242239
You can also create your own visualizations and dashboards tailored towards metrics of your own interest. Read more about creating Kibana visualizations from Kibana's [official documentation](https://www.tutorialspoint.com/kibana/kibana_create_visualization.htm).
243240
244-
![kibana dashboard][2]
241+
:::image type="content" source="./media/network-watcher-intrusion-detection-open-source-tools/figure2.png" alt-text="Screenshot shows Kibana dashboard." lightbox="./media/network-watcher-intrusion-detection-open-source-tools/figure2.png":::
245242
246243
### Visualize IDS alert logs
247244
248245
The sample dashboard provides several visualizations of the Suricata alert logs:
249246
250247
1. Alerts by GeoIP – a map showing the distribution of alerts by their country/region of origin based on geographic location (determined by IP)
251248
252-
![geo ip][3]
249+
:::image type="content" source="./media/network-watcher-intrusion-detection-open-source-tools/figure3.png" alt-text="Screenshot shows geo IP." lightbox="./media/network-watcher-intrusion-detection-open-source-tools/figure3.png":::
253250
254251
1. Top 10 Alerts – a summary of the 10 most frequent triggered alerts and their description. Clicking an individual alert filters down the dashboard to the information pertaining to that specific alert.
255252
256-
![image 4][4]
253+
:::image type="content" source="./media/network-watcher-intrusion-detection-open-source-tools/figure4.png" alt-text="Screenshot shows most frequent triggered alerts.":::
257254
258255
1. Number of Alerts – the total count of alerts triggered by the ruleset
259256
260-
![image 5][5]
257+
:::image type="content" source="./media/network-watcher-intrusion-detection-open-source-tools/figure5.png" alt-text="Screenshot shows the number of Alerts.":::
261258
262259
1. Top 20 Source/Destination IPs/Ports - pie charts showing the top 20 IPs and ports that alerts were triggered on. You can filter down on specific IPs/ports to see how many and what kind of alerts are being triggered.
263260
264-
![image 6][6]
261+
:::image type="content" source="./media/network-watcher-intrusion-detection-open-source-tools/figure6.png" alt-text="Screenshot shows pie charts of the top 20 IPs and ports that alerts were triggered on." lightbox="./media/network-watcher-intrusion-detection-open-source-tools/figure6.png":::
265262
266263
1. Alert Summary – a table summarizing specific details of each individual alert. You can customize this table to show other parameters of interest for each alert.
267264
268-
![image 7][7]
265+
:::image type="content" source="./media/network-watcher-intrusion-detection-open-source-tools/figure7.png" alt-text="Screenshot shows a summary table with details about each individual alert." lightbox="./media/network-watcher-intrusion-detection-open-source-tools/figure7.png":::
269266
270267
For more documentation on creating custom visualizations and dashboards, see [Kibana's official documentation](https://www.elastic.co/guide/en/kibana/current/introduction.html).
271268
272269
## Conclusion
273270
274271
By combining packet captures provided by Network Watcher and open source IDS tools such as Suricata, you can perform network intrusion detection for a wide range of threats. These dashboards allow you to quickly spot trends and anomalies within your network, as well dig into the data to discover root causes of alerts such as malicious user agents or vulnerable ports. With this extracted data, you can make informed decisions on how to react to and protect your network from any harmful intrusion attempts, and create rules to prevent future intrusions to your network.
275272
276-
## Next steps
277-
278-
Learn how to trigger packet captures based on alerts by visiting [Use packet capture to do proactive network monitoring with Azure Functions](network-watcher-alert-triggered-packet-capture.md)
279-
280-
Learn how to visualize your NSG flow logs with Power BI by visiting [Visualize NSG flows logs with Power BI](network-watcher-visualize-nsg-flow-logs-power-bi.md)
281-
273+
## Next step
282274
275+
Learn how to trigger packet captures based on alerts:
283276
284-
<!-- images -->
285-
[1]: ./media/network-watcher-intrusion-detection-open-source-tools/figure1.png
286-
[2]: ./media/network-watcher-intrusion-detection-open-source-tools/figure2.png
287-
[3]: ./media/network-watcher-intrusion-detection-open-source-tools/figure3.png
288-
[4]: ./media/network-watcher-intrusion-detection-open-source-tools/figure4.png
289-
[5]: ./media/network-watcher-intrusion-detection-open-source-tools/figure5.png
290-
[6]: ./media/network-watcher-intrusion-detection-open-source-tools/figure6.png
291-
[7]: ./media/network-watcher-intrusion-detection-open-source-tools/figure7.png
277+
> [!div class="nextstepaction"]
278+
> [Use packet capture to do proactive network monitoring with Azure Functions](network-watcher-alert-triggered-packet-capture.md)

0 commit comments

Comments
 (0)