Folks...

Looking for suggestions here on approach for a simple use case.

I have ELK up and running monitoring SSH connections to a server.  I also 
use ThreatConnect which provides IP addresses (IPs of hosts that bad people 
use) that I query via a RESTful API. I DO NOT have any of the threat intel 
from ThreatConnect currently feeding into ELK.

I'd like to show in Kibana when there is a match on indicators: i.e. when 
the host used to connect to a server via SSH matches an IP address that is 
known to be bad (from ThreatConnect).

A connection or disconnection message shows as below where 
_source:"message" contains the IP of the SSH client (111.111.111.111) in 
this case.

{
  "_index": "logstash-2015.04.29",
  "_type": "syslog",
  "_id": "Bxxxxxxxxxxxx",
  "_score": null,
  "_source": {
    "message": "Apr 29 10:41:01 ip-123.123.123.123 sshd[32574]: Received 
disconnect from 111.111.111.111: 11: disconnected by user",
    "@version": "1",
    "@timestamp": "2015-04-29T14:41:01.726Z",
    "type": "syslog",
    "host": "xxxxxxxx.ec2.internal",
    "path": "/var/log/secure"
  },


So somehow I'd like to run logic that reads that IP, queries the 
ThreatConnect API asking: , "Have you seen this IP before" - and if so 
present that back to the user with an alert saying you have a problem 
here... Question is where do I run that logic I suppose...

Any thoughts on best approach to implement this use case?

Thanks!
c

-- 
You received this message because you are subscribed to the Google Groups 
"elasticsearch" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to elasticsearch+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/elasticsearch/772cc2fd-ae81-4cc3-abbb-7e888600072b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to