My Security Intelligence and Monitoring Agenda List
1 Project[Reorg]
1.1 NSM-project NSM
- HASecuritySolutions/Logstash: Contains Logstash related content including tons of Logstash configurations
- State “✔ DONE” from
Just a simle NSM testing platform
[X]
[IOT] https://liu.diva-portal.org/smash/get/diva2:974379/FULLTEXT02.pdf CLOSED:- State “DONE” from “”
*
1.2 new
1.3 Search website
2 Silk
2.1 Document
- Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX - IEEE Journals & Magazine
- https://www.google.com/search?q=CERT/NetSA+%22pdf%22&ei=k939W7ukKILX0gLUt5tw&start=10&sa=N&ved=0ahUKEwj7ufnx5vXeAhWCq1QKHdTbBg4Q8tMDCH0&biw=1152&bih=599&dpr=2.5
- https://www.ietf.org/proceedings/80/slides/ipfix-4.pdf
- https://tools.netsa.cert.org/silk/analysis-handbook.pdf [Analysis Handbook Nov 2018 updated]
- 📄 REVIEW Analysis handbook BOOK LEARN
- lisa04.pdf
- lisa06.pdf
- https://resources.sei.cmu.edu/asset_files/Presentation/2011_017_101_50515.pdf [iSilk]
- nyov/netsa-python: NetSA Python - http://tools.netsa.cert.org/netsa-python/
3 Osquery
3.1 PPT/Doc
4 Mitre&ATT
5 ELK
5.1 BLog
5.2 Logstash
5.3 Repo
6 thesis
:PROPERTIES: academia :CATEGORY: thesis
6.1 1808.10742.pdf [Anomaly Detection in Cyber Network Data Using a Cyber Language Approach]
6.2 Notice Correlation and Covert CTC Detection — Michael Dopheide & Ross Gegan - YouTube
- covert.pdf [IP Covert Timing Channels]
6.4 HTTP
- DeepHTTP: Semantics-Structure Model with Attention for Anomalous HTTP Traffic Detection and Pattern Mining
- [[https://blog.csdn.net/qq_30050175/article/details/90577778][DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting - 一只咸鱼的小努力 - CSDN
7 Con & Video & Documention
7.1 Bro
7.4 Hunting book [APT]
7.7 WAITING Traffic filtering at scale on Linux Document NSM
- State “WAITING” from
7.8 bro-cheatsheets/Corelight-Bro-Cheatsheets-2.6.pdf at master · corelight/bro-cheatsheets Document
7.9 bro-2.4.1.pdf Document:
7.12 Detection of HTTPS Malware Traffic :Document
7.13 d1s1r4.pdf PPT:
8 Repo
8.1 Performance monitoring
8.2 https://scrapy.org/ spider
8.3 JohnLaTwC (John Lambert) [Distinguished Engineer and General Manager, Microsoft Threat Intelligence Center]
8.5 1N3 (xer0dayz)
10 Data visualization
10.1 ⚔ STARTED grafana/grafana: The tool for beautiful monitoring and metric analytics & dashboards for Graphite, InfluxDB & Prometheus & More
12 Owncloud NSM
curl -u ghost:own@321 -T "/Users/gtrun/org-notes/NsmOrg.org" "http://192.168.1.100/owncloud/remote.php/webdav/org-notes/NsmOrg.org"
curl -u ghost:own@321 -O http://192.168.1.100/owncloud/remote.php/webdav/org-notes/NsmOrg.org
sshpass -p "123" scp /Users/gtrun/org-notes/NsmOrg.org 192.168.1.9:~/org-notes/.
sudo bro -r tests/traces/http-get-large-incomplete.pcap tests/scripts/file-analyzer.bro
13 OSINT
13.1 Feed
- [A] firehol/blocklist-ipsets: ipsets dynamically updated with firehol’s update-ipsets.sh script project
- danielmiessler/SecLists: SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
14 MITRE
15 Sandbox
16 Data
16.1 DATABASE
16.2 Index
16.3 Repo
18 SOC Platforms
18.5 ✘ CANCELED crits/crits: CRITs - Collaborative Research Into Threats
- State “✘ CANCELED” from