Suricata Rule Using Datasets #14306
Replies: 2 comments 3 replies
-
How many domains are in these updates? How often are you updating them? And how are you monitoring DNS queries (via Zeek parsing of live network traffic or some kind of log ingestion)? |
Beta Was this translation helpful? Give feedback.
1 reply
-
For that many domains, you might want to use Zeek Intel: https://docs.securityonion.net/en/2.4/zeek.html#intel A lot of this rule generation can be automated using something like MISP or another threat intel platform. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
• Security Onion version: 2.4.80
• Is this a cloud deployment or on-prem? On Prem w/internet access
• Did you install from our Security Onion ISO image or did you perform a network installation? I don’t know
• If network installation, what distro and version did you install on?
• How many nodes do you have? 1
• What are the hardware specs of each of those nodes? I don’t know
• How are each of those nodes configured? (ex. manager with 2 search nodes and 3 forward nodes)
• Are you experiencing issues monitoring network traffic? No
• Does so-status show all services running? Yes
• Do you get any failures when you run sudo salt-call state.highstate? No
• Does the SOC Grid page show any failures? No
• Explain your issue:
I periodically receive a list of malicious domains and I would like to create an alert that I can easily update to show any dns requests made for those domains. From the research I have done, it seems that the best way to do this is to create a dataset that I can edit when I receive the updated intelligence. What is the best way to update suricata.yaml to configure the dataset? I have tried doing it through the SOC by adding the following to suricata > config > advanced:
datasets:
id: test-dns-bl
type: string
state: /opt/datasets/test-dns-bl.list
This update does not seem to be taking, so I assume I am doing it wrong. When I look at suricata.yaml, I do not see an update, nor do I see the date of the file changing. Can this not be configured in the way I am trying to do it? If not, what is the appropriate way?
If there is a better way to accomplish what I am trying to do then please let me know, I have a lot to learn still!
Thank you!
Beta Was this translation helpful? Give feedback.
All reactions