Cyber Security: SELKS: Difference between revisions
From OnnoCenterWiki
Jump to navigationJump to search
No edit summary |
No edit summary |
||
| Line 18: | Line 18: | ||
==What is Stamus Community Edition?== | |||
Stamus CE is the Stamus Networks open-source application that brings all these components together. Stamus CE provides the web interface for the entire system, giving you the ability to: | |||
* Manage multiple Suricata rulesets and threat intelligence sources | |||
* Upload and manage custom Suricata rules and IoC data files | |||
* Hunt for threats using predefined filters and enhanced contextual views | |||
* Apply thresholding and suppression to limit verbosity of noisy alerts | |||
* View Suricata performance statistics and information about Suricata rule activity | |||
* Apply Kibana, EveBox, and Cyberchef to the Suricata NSM and alert data | |||
Revision as of 21:09, 15 July 2023
SELKS is a free, open-source, and turn-key Suricata network intrusion detection/protection system (IDS/IPS), network security monitoring (NSM) and threat hunting implementation created and maintained by Stamus Networks.
Released under GPL 3.0-or-later license, the live distribution is available as either a live and installable Debian-based ISO or via Docker compose on any Linux operating system.
SELKS is comprised of the following major components:
- Suricata - Ready to use Suricata
- Elasticsearch - Search engine
- Logstash - Log injection
- Kibana - Custom dashboards and event exploration
- Stamus Community Edition (CE) - Suricata ruleset management and Suricata threat hunting interface
In addition, SELKS now includes Arkime, EveBox and CyberChef.
What is Stamus Community Edition?
Stamus CE is the Stamus Networks open-source application that brings all these components together. Stamus CE provides the web interface for the entire system, giving you the ability to:
- Manage multiple Suricata rulesets and threat intelligence sources
- Upload and manage custom Suricata rules and IoC data files
- Hunt for threats using predefined filters and enhanced contextual views
- Apply thresholding and suppression to limit verbosity of noisy alerts
- View Suricata performance statistics and information about Suricata rule activity
- Apply Kibana, EveBox, and Cyberchef to the Suricata NSM and alert data