When it comes to correlation capabilities, LogRhythm has you covered. With AI Engine you can perform a variety of activities, from observing a single activity to applying advanced behavior rules across multiple dimensions (entities, devices, log sources, metadata, etc.). In addition to some of the more obvious capabilities, I’m here to tell you about one not so known feature of AI Engine called Temporal Chain Normalization (TCN).
Let’s investigate TCN a bit and understand just what it is (other than sounding extremely cool).
Temporal Chain Normalization
The best way to explain TCN is through an example. Take a simple correlation activity: If we see Event A followed by Event B, then we generate an alert.
Click on images to view larger
Note: The normalized timestamps (in green) are extracted from the Log Message itself. They do not rely on collection time.
This logic is used by many of the pre-built rules within the LogRhythm Security Intelligence and Analytics Platform (e.g., brute force attack: multiple login failure [Event A] followed by login success [Event B])
Computers Can (and Do) Lie
You’re not going to be surprised to hear this, but unfortunately, computers, users, and even the internet, aren’t always 100 percent consistent or reliable. Network latency, system downtime, hawking radiation, and other anomalies can impact the collection speed of audit and log data.
Imagine you have a correlation rule looking for an attack (Event A) followed by a compromise (Event B). But when an attack actually occurs, the logs are received out of order because of a network outage. What happens then? Nothing happens. No alarms fire and that’s a problem.
As you can see below the collection timestamp (in red) shows that Event B was received after Event A; therefore, no alert was generated.
Organizations should not assume that all data generated within their environment is assigned an accurate timestamp relative to the variety of data sources and logging mechanisms across the IT environment. Disparate timestamps can result in data being evaluated out of order, which impairs real-time event recognition and response. There are many reasons log and machine data collected for analysis may be attributed to a different time than when the event actually occurred!
Normalise and Reorder Logs
Unless you have a security information and event management (SIEM) platform with the ability to normalise and reorder out of sequence log messages, you are going to miss important alerts.
The good news? The LogRhythm Security Intelligence Platform can do just that with TCN.
Temporal Chain Normalization in Action
Let’s start off with something simple. Here’s an AI Engine rule that looks for Event A followed by Event B. For simplicity, I’ve generated two unique Windows Events and expect to see Event ID 4321 followed by Event ID 4322.
Note: As this is a demonstration rule, it only groups on the Known Host for Rule Block 1 (as I’ll be generating Event A and Event B from two different hosts).
Using a simple script I generated Event A (on Host 3) and Event B (on Host 4) in the correct chronological order to validate the rule works as expected:
As expected, here’s the resultant alarm firing when Event A and Event B were generated and collected in the proper order.
Next I ran the same test again. But this time I stopped the LogRhythm Collector running on Host 3, then proceed to generate Event A (on Host 3) and then Event B (on Host 4), then waited a minute to start the Collector on Host 3 again. This caused the collected order of logs to effectively be Event B followed by Event A, rather than Event A followed by Event B.
Here’s a breakdown of the above with detailed steps:
- Stop LogRhythm Collector service
- Generate Event A (vmid 4321)
- Generate Event B (vmid 4322)
- Wait 60 seconds
- Start LogRhythm Collector service
Here’s the resulting alarm.
Note the time it fired is 11:19:20 (EST).
Did it surprise you to find out that the alarm fired even though the events were collected out of order? This is all due to LogRhythm’s time normalization capabilities.
Something a Bit More Advanced
Let’s jump into a more complex example using some of the pre-built AI Engine rules within LogRhythm. I choose rule number 42: User Thread Detection: Internal Brute Force Auth. For those not familiar with this rule, here’s how it works:
Rather than create a network failure, or turn off an agent, I’ll demo this with a simple custom log source with authentication activity. In this sample log source, we’re collecting via text file and the first entry (bold) is our login success. Note its timestamp of 19:53:50. Next up, we leave it a little while and add the remaining dozen login failures—all which appear afterwards in the log file, but have an earlier timestamp:
After a minute or so, the following alarm is generated.
Yet again we’ve successfully detected the brute force attack, even though the log messages were collected out of sync.
Multiple Time Zones? No Problem
For organizations with a network that spans across multiple time zones, TCN is a basic and must have feature. With TCN, all logs are stored in Coordinated Universal Time (UTC) allowing for accurate event correlation and prioritization.
More from Chris Martin
- Catching Beaconing Malware
- Do You Know Your Network?
- How Far Cyber Criminals Will Go to Get Your PII