2016-03-17 03:44 PM
RSA likes to proclaim that the Security Analytics system can do "real-time alerting and correlation". I want examples/samples for EXACTLY how this is done in a meaningful way.
Here is an example, say I want to look at incoming IDS alerts provided via logs. Now say that I want to alert when we get this IDS event but only if I don't see specific packet events that correlate with the source and destination IP's seen in the IDS log. Also I want to do this within a "reasonable" amount of time like 5 minutes.
One definite challenge I see is that if we process the packet data before we process the log data, it'll fail as the query in ESA looks at the log event FIRST. Either way the flow of data needs to be real-time for this to pan out and that assumes no congestion/processing delays of any kind.
If I try to do app rules or anything of that nature, again, I have to correlate across the infrastructure and potentially within 5-10 minute time windows.
A Hadoop cluster with sufficient nodes and hardware could do queries in parallel, but then I'd still need a method to join that data and compare.
Thoughts?
2016-04-07 04:50 PM
FYI - I submitted a case with RSA and our TAM and we got a Knowledge Engineer who knew a lot about ESA and fulfilled most of my questions, albeit I haven't had a chance to test all of this via my UAT environment as I am mid UAT upgrade to 10.5.2.
tl;dr: You'll need to use ESA patterns, rstream (reverse streams) named windows and contexts.
When I figure out specific examples I'll post them here.
Update: 9-16-2016 - Checkout the attached, has Advanced Use Cases with EPL code. Very helpful. I've tested one