loglizer
HELK
loglizer | HELK | |
---|---|---|
2 | 10 | |
1,228 | 3,659 | |
1.5% | - | |
0.0 | 0.0 | |
14 days ago | almost 3 years ago | |
Jupyter Notebook | Jupyter Notebook | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
loglizer
-
SOC with machine learning
https://github.com/logpai/loglizer has an MIT license. Seems like they've done some of the heavy lifting already. If you're just looking for logs, check out https://github.com/logpai/loghub.
-
how to never ever lose connection to raspberry pi
If you want to really get paranoid, then you can write a monitoring app that uses machine learning to do the log analysis and detect anomalies in your system. There are some open source tools available, like this for example. Also you can train the network for your specific use case and then just have the service running the inference on your logs and a pre-trainer model that is running on system logs. Then you really get in paranoid mode.
HELK
-
Kali Linux 2023.1 introduces 'Purple' distro for defensive security
Utilizing that api and juniper notebooks is exactly why Hunting Elk is the way it from my understanding.
-
where to start learning about cyber defense for beginners
So you can actual do both defensive while practicing offensive. If you can set up a lab system with an attacker, for ease using kali, and defensive systems like a single windows box, or you can go balls to the wall if you have the resources and set up an AD environment and then ship all the logs to a SIEM system like Splunk or HELK (https://github.com/Cyb3rWard0g/HELK). Building off the environment you can also include Mordor (https://github.com/UraSecTeam/mordor)
-
Home Virtual SIEM Lab Suggestions?
HELK + Mordor combo https://github.com/Cyb3rWard0g/HELK
- Threat hunting Playbooks
-
SOC with machine learning
On a side note - I somehow have the feeling that you are trying to recreate https://github.com/Cyb3rWard0g/HELK
- Suggestion for Easy to use and affordable cost SIEM solution
- Build a SOC LAB
-
Elastic for security
You can find tools that leverage ELK that aren't necessarily plugins. SIEM looks like it has some free component to it, too: https://github.com/Cyb3rWard0g/HELK https://www.elastic.co/blog/elastic-siem-free-open
-
Home lab with security monitoring tools?
HELK can help for the SIEM and detection part
-
Blue team projects
MISP is a Threat Intelligence Platform (TIP), not a hunting platform. That would be something like HELK
What are some alternatives?
pyod - A Comprehensive and Scalable Python Library for Outlier Detection (Anomaly Detection)
pfelk - pfSense/OPNsense + Elastic Stack
Fog - An open source computer cloning & management system
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
wazuh-ruleset - Wazuh - Ruleset
docker-elk - The Elastic stack (ELK) powered by Docker and Compose.
anomaly-detection-resources - Anomaly detection related books, papers, videos, and toolboxes
RedELK - Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
luminol - Anomaly Detection and Correlation library
praeco - Elasticsearch alerting made simple.
kafkaml-anomaly-detection - Project for real-time anomaly detection using Kafka and python
jupyter2kibana - A Workflow for Data Scientists to bring Jupyter Notebook Visualizations to Kibana Dashboards