AlienVault Life Cycle of A Log
AlienVault Life Cycle of A Log
AlienVault Life Cycle of A Log
CONTENTS
1. INTRODUCTION ..................................................................................................... 4
1. INTRODUCTION
The objective of this document is to show the life cycle of a log message through AlienVault
from the device to the user interface.
2. LOG COLLECTION
Log collection is the heart of a SIEM. AlienVault collects logs from devices, systems and
software:
These logs are normalized, extracting common data fields from them: IP address, host names,
user names, interface names, etc.
Key events are assigned a Security ID (SID). These are the events that are of interest to a
Security Analyst.
SIDs are correlated into alarms. Log correlation can see patterns in activity that a single device
or security control cannot.
User Logged In
User names
IP Addresses
MAC addresses
URIs
Extracting these values out of the log message text and into a field is called Normalization.
Normalization is what allows us to perform queries such as: Show all events where the source
IP is 192.168.1.3.
date
sensor
interface
plugin_id
plugin_sid
priority
prococol
src_ip
src_port
dst_ip
dst_port
username
password
filename
userdata1
userdata2
userdata3
userdata4
userdata5
userdata6
userdata7
userdata8
userdata9
A low-priority, the high reliability event could be: user joe@mydomain logged in from
10.53.80.3
This message is always accurate, but normal behavior.
A high-priority, low reliability event could be: Authentication protocol anomaly from
10.53.80.3.
This message is a best guess; detection, but highly unusual.
Higher Risk Scores help the analyst know what to examine first!
4. EVENTS VISUALIZATION
Events can be visualized through these 2 options: