sagan

Sagan uses a 'Snort like' engine and rules to analyze logs (syslog/event log/snmptrap/netflow/etc)

Github星跟蹤圖

What is Sagan?

Sagan is an open source (GNU/GPLv2) high performance, real-time log
analysis & correlation engine. It is written in C and uses a
multi-threaded architecture to deliver high performance log & event
analysis. The Sagan structure and Sagan rules work similarly to the
Suricata & Snort IDS engine. This was intentionally done to maintain
compatibility with rule management software (oinkmaster/pulledpork/etc)
and allows Sagan to correlate log events with your IDS/IPS system.

Sagan can write out to databases via Suricata EVE formats and/or
Unified2, it is compatible with all Snort & Suricata consoles. Sagan
can write also write out JSON which can be ingested by Elasticsearch
and viewed with console like Kibana, EVEbox, etc.

Sagan supports many different output formats, log normalization
(via liblognorm), GeoIP detection, script execution on event and
automatic firewall support via "Snortsam" (see http://www.snortsam.net).

Sagan uses the GNU "artisic style".

Sagan Features:

  • Sagan’s multi-threaded architecture allows it to use all CPUs / cores for real-time log processing.
  • Sagan's CPU and memory resources are light weight.
  • Sagan uses a similar rule syntax to Cisco’s “Snort” & Suricata which allows for easy rule management and correlation with Snort or Suricata IDS / IPS systems.
  • Sagan can store alert data in Cisco’s “Snort” native “unified2” binary data format or Suricata's JSON format for easier log-to-packet correlation.
  • Sagan is compatible with popular graphical-base security consoles like Snorby, BASE, Sguil, and EveBox.
  • Sagan can easily export data from other SIEMs via syslog.
  • Sagan can track events based on geographic locations via IP address source or destination data (e.g., identifying logins from strange geographic locations).
  • Sagan can monitor usage based on time of day (e.g., writing a rule to trigger when an administrator logs in at 3:00 AM).
  • Sagan has multiple means of parsing and extracting data through liblognorm or built in parsing rule options like parse_src_ip, parse_dst_ip, parse_port, parse_string, parse_hash (MD5, SHA1,SHA256).
  • Sagan can query custom blacklists, Bro Intel subscriptions like Critical Stack and “Bluedot”, Quadrant Information Security threat intelligence feeds by IP address, hashes (MD5, SHA1, SHA256), URLs, emails, usernames, and much more.
  • Sagan’s “client tracking” can inform you when machines start or stop logging. This helps you verify that you are getting the data you need.
  • Sagan uses “xbits” to correlate data between log events which allows Sagan to “remember” and flag events across multiple log lines and sources.
  • Sagan uses Intra-Process communications between Sagan processes to share data. Sagan can also use Redis (beta) to share data between Sagan instances within a network.
  • To help reduce “alert fatigue”, Sagan can “threshold” or only alert “after” certain criteria have been met.

Where can I get help with Sagan?

For more general Sagan information, please visit the offical Sagan web site:
https://sagan.quadrantsec.com.

For Sagan documentation to assist with installation, rule writing, etc. Check out:
https://sagan.readthedocs.io/en/latest/

For help & assistence, check out the Sagan mailing list. If it located at:
https://groups.google.com/forum/#!forum/sagan-users. You can also ask questions on the
Sagan chat system at https://m.telephreak.org/sagan/channels/town-square. The chat system
is similar to "Slack".

If you're looking for Sagan rule sets on Github, they are located at:
https://github.com/beave/sagan-rules

主要指標

概覽
名稱與所有者beave/sagan
主編程語言
編程語言Shell (語言數: 0)
平台
許可證
所有者活动
創建於2010-07-09 11:58:23
推送於2021-02-09 19:32:13
最后一次提交2021-02-09 14:31:48
發布數5
最新版本名稱1.1.0 (發布於 )
第一版名稱sagan-1.0.0RC4 (發布於 )
用户参与
星數228
關注者數26
派生數60
提交數1.6k
已啟用問題?
問題數128
打開的問題數19
拉請求數38
打開的拉請求數0
關閉的拉請求數5
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?