--
You received this message because you are subscribed to the Google Groups "Wazuh mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/f5833ba2-dd48-47c0-9525-0cd5acc2ce56%40googlegroups.com.
Hi Nicolas,Thank you for your email. When I review logcollector c code directory, I have seen that it is about reading file and log in system. There are 6 log types and each function reads logs if it is active in config, However I cant understand how to collect network traffic and agent running process list with their API (or system function) calling.Let me explain what I want to do here. I am an academic person. I have seen in literature there are so many methods that are not in use in real life. All of them are free for contributing to Cyber Security like Wazuh. This junction point can be an opportunity for merging them. So, how to do that?They have dataset. They extract feature and test their proposed method with as far as more parameter and mathematical background. Then they explain everything and publish the paper as a last point of theory. This should be start point of practice if we create an environment which they test their method in wazuh.This is only possible with adding two freedom choice for acedemicians. One is for feature and another is for model. Feature is about logcollector. They can use different data type in their model, like network traffic, API-call function, disassembly of executable file, etc. They will want to treat their data vector in some processes like n-gram, markov chain etc. These should be coded in the module placed in analysisd.Firstly I want to implement my model which is based on Markov chain. It has two different version, with using network traffic data and with API-calls. When I succeed to get these data and send to analysisd, I will implement the model and attach to analysisd.I hope that this is not dream and it can be possible.Thanks,MertNicolas Papp <nicola...@wazuh.com>, 22 Mar 2020 Paz, 07:10 tarihinde şunu yazdı:Hi Mert, there is an Illustration in https://documentation.wazuh.com/3.10/user-manual/capabilities/log-data-collection/how-it-works.html that can give you a little more perspective:What Logcollector does is basically read log files. Those log files could be in both the manager or the agent so both components have them. In the case of an agent the logline is inserted into an event and sent to the manager. After that the event is received byAnalysisd that does all the decoding in rule matching, there is where you probably want to hook your module. If a match is produced in analysisd an alert is generated an even you can configure a response to be executed in the agent. Check up this ink https://documentation.wazuh.com/3.10/user-manual/capabilities/active-response/how-it-works.html if you want more insights on that.This illustration sums it up pretty well:Please let me know if there is anything else I can help with.Best Regards,NicolasOn Fri, Mar 20, 2020 at 8:23 PM Mert Nar <mrt....@gmail.com> wrote:Hi Nicolas,Thank you for your fast response and informative email. It has been a very good start for me.
Before I tried to understand the codes of wazuh, I have already set up these virtual machines. So, it is okay for me to understand what it is.But I cant understand logcollector module completely. How does it work? What actually does it collect as log? There are some defined rules and decoders, okay. but what is the relation log and event? after collecting them, how to relate log (or event) with rule and decode in code?are log and event different or same?Thank you for your time, really appreciate itMertNicolas Papp <nicola...@wazuh.com>, 19 Mar 2020 Per, 17:33 tarihinde şunu yazdı: