Network Monitoring and Vulnerability Scanning Overview

Slide Note
Embed
Share

Kashif Mohammad from the Department of Physics at the University of Oxford provides insights into their setup involving ZEEK, ELK Monitoring, and OpenVas for network monitoring and vulnerability scanning. The team aims to enhance network security through structured classification of nodes based on types, ownership structures, and data sensitivity levels.


Uploaded on Jul 29, 2024 | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Site Report Site Report Kashif Mohammad Department of Physics University of Oxford

  2. ZEEK and ELK Small setup of ZEEK and ELK Monitoring Grid Services through ZEEK But not much interesting data Plan to monitor Physics department network Waiting for network restructure Installed a MISP instance and long term plan is to integrate with ZEEK

  3. ZEEK + ELK Setup Switch Mirror Ports VMs ES Kib LS FB Beat Zeek oVirt Host ELK Bro Server

  4. OpenVas Running OpenVas for Vulnerability Scanning Installed on top of Kali Linux Mostly worked out of box We have quite a few vlans and subnets so scanning across network range takes too much time So running `nmap sn <ip-range>` first and then feeding that list as input for openvas scan. Much better

  5. OpenVas OpenVas Quite satisfy with the tool Completely free Active mailing list Reporting is not very intuitive and can be difficult to navigate 100 page PDF reports Fair number of false positives Can be unstable Problem might be at my end

  6. What We Want What We Want Classify nodes on basis of types Servers, Desktop, DAQ, Switches, Network attached devices Classify on basis of ownership structures Sub-department, web admin, desktop admin Classify on basis of data sensitivity Status over the time

Related


More Related Content