Top Banner
Cyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring Coleman Kane [email protected] September 24, 2014
23

Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

May 06, 2018

Download

Documents

vanquynh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Cyber Defense Overview Network Security Monitoring – 1 / 23

Network Security Monitoring

Coleman [email protected]

September 24, 2014

Page 2: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Passive Monitoring

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 2 / 23

Passive monitoring analyzes traffic with the intention ofbeing non-disruptive to the transmission of the traffic.Typically used in environments wherehigh-network-availability is critical. This is typical in manycoporate environments where the network supports aconsiderably large user base. As such, there are numeroussolutions out there which provide passive network and hostmonitoring.

Page 3: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Levels of Network Monitoring

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 3 / 23

There are various approaches to network monitoring whichrange from basic "flow data" to full packet capture, andeven beyond.

Flow data Logs per-packet endpoint information, optionallyincluding packet sizes. Common for aggregate reporting todetermine activity anomolies between your network andspecific external or internal hosts.

Transaction data Logs deeper connection-level information,which may span multiple packets within a connection.Must have pre-defined templates for protocol formatting.Common for logging HTTP header/request information,SMTP command data, etc.

Alert data Typically the result of finely-tuned signaturesmatching against packet content, and similar in nature totransaction data. This information, rather than being forlogging purposes is intended to indicate discrete eventswhich might be attacks.

Page 4: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Levels of Network Monitoring 2

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 4 / 23

Packet capture Full capture of packet-level contents(sometimes called pcap). This is roughly identical to whatthe OS sees on the wire

Reassembly Beyond packet-level capture, this functionalityinvolves transport/application recognition and canreassemble IP packets into TCP stream data, or evenparse application-level communications to rebuild aconversation, file transfer, or even email.

Page 5: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Flow Data

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 5 / 23

Per-packet statistics, sometimes includingconnection/packet-counting. The goal of this is todetermine how much traffic (either counts or bytes) isflowing into or out of a particular host. Distributed acrossthe network and combined with centralized aggregation ofdata from many sensors, you can build a picture of yournetwork to help you identify "high traffic" entities whichmight indicate a problem (such as active data theft).

Page 6: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Flow Data Graphic

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 6 / 23

Figure 1: Flow Data in Snorby[2]

Page 7: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Flow Data Management Tools

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 7 / 23

Example tools which capture/analyze flow data

cxtracker http://www.gamelinux.org/?cat=21

https://github.com/gamelinux/cxtracker/

SANCP http://www.metre.net/sancp.html

Cisco NetFlow Collector

http://www.cisco.com/c/en/us/products/cloud-systems-management/

netflow-collection-engine/index.html

Arbor PeakFlow

http://www.arbornetworks.com/products/peakflow/sp

netstat With -s/–statistics option on Linux (-m on BSD & MacOS X)can report host-local flow information per interface. Endpoints couldlog this info at regular intervals to centralized system to buildendpoint flow database.

Page 8: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

RFC 3176: sFlow standard

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 8 / 23

Standard UDP-reporting mechanism for multiple devices tocommunicate "net flow" information amongst one another

■ http://www.sflow.org/

■ http://www.faqs.org/rfcs/rfc3176.html

■ Products supporting the export and import of sFlowdata:http://www.sflow.org/products/index.php

Page 9: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Transaction Data

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 9 / 23

Sometimes lumped into flow data category. However, wewill make the distinction that transaction data requiressensor-level parsing that is traditionally not included in thebase OS. For instance, transaction-level monitoring mightinvolve parsing the Referer header from HTTP traffic,usernames from FTP or Telnet traffic, or any othermetadata which must be parsed via a prepared recipe, butgets reported while associated traffic may be discardedafter parsing is complete.

Page 10: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Transaction Data Management Tools

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 10 / 23

Example tools which handle/generate transaction data

httpry http://dumpsterventures.com/jason/httpry/

bro https://www.bro.org/sphinx/httpmonitor/index.html

https://www.bro.org/sphinx/mimestats/index.html

Colasoft Capsa http://www.colasoft.com/capsa-free/

Network Proxy Most proxies can do this for you for HTTP & FTP,sometimes more protocol support too

Page 11: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Transaction Data Graphic

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 11 / 23

Figure 2: ELSA ScreenShot including HTTP transaction data[1]

Page 12: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Alert Data

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 12 / 23

Alert data is the monitoring data which is intended to beused to drive investigation & work. While Flow &Transactional data is intended to log a small amount of thetotal data from all network traffic (80/20 rule), alert datais intended to identify to analysts where/when occurred thespecific network traffic which is highly suspicious, andnecessitates being investigated.

■ Identifies where to look in your transaction logs &packet capture archives quickly

■ "Best guess" alert as to what attack might behappening

Page 13: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Alert Tools

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 13 / 23

Snort One of the oldest signature-based packet analysistools https://www.snort.org/

Suricata Newer signature-based packet analysis tool,similar to Snort http://suricata-ids.org/

Bro Newer versions have signature analysis capability ontop of the transactional parsing capabilitieshttps://www.bro.org/

SourceFire Now owned by Cisco Systemshttp://www.sourcefire.com/, based upon Snort

HP TippingPoint Firewal & IDShttp://www.tippingpoint.com

Page 14: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Alert Management Tools

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 14 / 23

These tools can be used for managing response to alerts

RT Best Practical Request Tracker, has a module forincident response called "RTIR"

Sguil Very popular alert management/handling consolehttp://nsmwiki.org

Commercial A lot of commercial IDS systems provide acustom console for managing alerts

ArcSight "SEIM" tool which can help manage alertsacross multiple IDS/IPS tools

Page 15: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Alert Data Graphic

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 15 / 23

Figure 3: Sguil with a bunch of Snort alerts

Page 16: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Packet Capture

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 16 / 23

Packet capture is the mechanism by which full or partialnetwork traffic is archived for analysis. Some sensorsimplement continuous recording of traffic to a storagedevice, in the event that it needs to be retrieved inresponse to alerting in the future. This is commonlyreferred to as "full packet capture", and storage istypically managed in a FIFO.

Page 17: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Packet Capture Tools

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 17 / 23

You should already be familiar with:

■ WireShark, tshark

■ Tcpdump

Also:

■ NetSniff-NG http://netsniff-ng.org/

■ IPCopper http://www.ipcopper.com/

Page 18: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Packet Capture Purpose

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 18 / 23

Reasons for implementing packet capture:

■ You might only learn of an attack after it happens

■ Many alerts built for later-stages of intrusion, but youwant to learn entire attack

■ User traffic baselining

■ Reference "good" traffic sampling

Page 19: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Stream Capture

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 19 / 23

Step above packet capture, and typically assists in streamanalysis and forensics. Packet capture will have all dataobjects broken up into individual packets, and must bereassembled using network tools. Additionally, forensics onthis data set need to be performed by a networking expert.Storing reassembled files, machine-to-machineconversations and other stream objects can improve forensicanalysis and enable more participants to help analyze.Some attacks can only be identified at this level, too.

Page 20: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Bro Capture

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 20 / 23

Bro NSM supports two capture methods:

■ File capture/carving

■ Stream capture carving

■ Configurable filtering for both

Page 21: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Monitoring Stack

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 21 / 23

In many cases, network monitoring doesn’t come down to asingle implementation from above, but rather a sensorsoftware stack built out of multiple components to fill yournetwork gaps.

Page 22: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

Security Onion Linux

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 22 / 23

■ Turn-key implementation of Ubuntu Linux to providea complete software stack using the best open-sourceprojects for monitoring

http://blog.securityonion.net/p/securityonion.html

■ Named "security onion" to reflect the many layers itis built from

■ Easy, scripted install, and designed to run in aVirtualBox environment

Page 23: Network Security Monitoring - gauss.ececs.uc.edugauss.ececs.uc.edu/Project4/Documents/nsm.pdfCyber Defense Overview Network Security Monitoring – 1 / 23 Network Security Monitoring

References

Passive Monitoring

Levels of NetworkMonitoring

Levels of NetworkMonitoring 2

Flow Data

Flow Data Graphic

Flow DataManagementToolsRFC 3176: sFlowstandard

Transaction DataTransaction DataManagementToolsTransaction DataGraphic

Alert Data

Alert ToolsAlert ManagementTools

Alert Data Graphic

Packet Capture

Packet CaptureToolsPacket CapturePurpose

Stream Capture

Bro Capture

Monitoring Stack

Security OnionLinux

Cyber Defense Overview Network Security Monitoring – 23 / 23

[1] Fighting apt with open-source software, part 1: Logging.http://ossectools.blogspot.com/2011/03/fighting-apt-with-open-source-software.html,March 2011.

[2] Scott Runnels. Managing overactive signatures.https://code.google.com/p/security-onion/wiki/ManagingAlerts, January2014.