Stamus Networks is proud to announce the availability of SELKS 1.1 stable release. SELKS is both Live and installable Network Security Management ISO based on Debian implementing and focusing on a complete and ready to use Suricata IDS/IPS ecosystem with its own graphic rule manager. Stamus Networks is a proud member of the Open Source community and SELKS is released under GPLv3 license.
You can download SELKS 1.1 from Stamus Networks’ open source page. Happy users of SELKS 1.0 can upgrade to SELKS 1.1 by using the traditional
apt-get update && apt-get dist-upgrade. Please note that default login/password for HTTPS access is
More information: Howto and README
Get help at Freenode IRC on the #SELKS channel and/or Google Mailing list.
Stamus Networks is proud to announce the availability of version 1.0-beta1 of Scirius, our web interface for Suricata ruleset management. This new release is a huge step toward 1.0 release as it contains a lot of new features and improvements. You can download it from Github download page.
The most visible update is the new design of the interface. It has been been completely changed thanks to Bootstrap CSS framework.
But the first change for user is that authentication and user management is now by default. Scirius is now multi user and features three level of permissions from read-only to superuser.
Another new feature is the display of graphics in some page. They are using Elasticsearch data. For example, the next screenshot is showing detail of a rule. A graph has been added to show the activity for that specific rules:
The interface is now more responsive as asynchronous requests are used to interact with Elasticsearch. This guarantee a responsive interface even if your Elasticsearch is slow.
SELKS user can upgrade to Scirius 1.0-beta1 via
apt-get update && apt-get dist-upgrade. Please note that the default user/password on SELKS is
selks-user/selks-user. Do not forget to change it after first login.
Stamus Networks supports its own generic and standard Debian Wheezy 64 bit packaging repositories for
These repositories provide Debian package for the newest Suricata IDS/IPS , htp releases and newest long-term stable kernel level version. SELKS already includes those repositories under /etc/apt/sources.list.d/selks.list.
You can use as follows:
wget -O – -q http://packages.stamus-networks.com/packages.stamus-networks.com.gpg.key | apt-key add – && \
Then you can add the following :
deb http://packages.stamus-networks.com/debian/ wheezy main
deb http://packages.stamus-networks.com/debian-kernel/ wheezy main
in /etc/apt/sources.list.d/stamus.list for example.
The repositories contain packages for the long-term stable kernel level version. So if you would like to upgrade to the latest long-term supported kernel you can just do (on Debian):
apt-get update && apt-get upgrade
apt-get install linux-libc-dev linux-headers-3.14.19-stamus linux-image-3.14.19-stamus
Those repos are included by default in SELKS.
apt-get install suricata
SELKS 1.0 is featuring a privacy dashboard. This is a dashboard focusing on HTTP and TLS protocols. The used data source is events generated by Suricata for these two protocols. The goal of this dashboard is to show the different interaction between website. For example, you will see on the following video that opening elysee.fr which is the French president website is triggering the opening of page on Facebook and Google Analytics. This means that both Facebook and Google knows you’ve went to the presidential website.
The setup of the demonstration is simple as we are connecting to the web on the virtual machine. This has been done because it was easier to record the screencast in that case. But the most interesting setup consists in sniffing the traffic of the physical host from SELKS running on the virtual machine. This way, SELKS will analyse your local traffic and you will be able to see in SELKS all the events coming from your real internet life.
The setup is simple. In Virtualbox, go to the machine details and click on network. Then choose to bridge your physical network interface and allow promiscuous mode on the interface:
Watch the following video to discover how this dashboard can be used:
An other way to use this privacy dashboard is to use one of the filter. For instance, if we filter on
http.http_refer:"http://www.whitehouse.gov" we get a dashboard containing all HTTP events with a referrer being the US president website. So if you look at the hostname on the following screenshot, you will see that going on whitehouse.gov also lead you to external websites
My favorite in this list is
www.youtube-nocookie.com but something like
cloud.typography.com is really interesting too. Even a website like whitehouse.gov is not anymore hosting is own fonts.
The privacy dashboard is also containing TLS information extracted by Suricata. It lists TLS connections done on well know wesbite such as Facebook, Twitter or Google. For example, we can see that going on CNN cause some TLS hits on Twitter and Facebook.
TLS being encrypted we can’t prove this link and that’s the short time frame that stand for a proof of the link between websites.
SELKS privacy dashboard is just an example of what you can achieve in SELKS by using Suricata network security monitoring capabilities. The demonstration shown here is local but don’t forget you can do it at the level of a whole network.
Stamus Networks is proud to announce the availability of SELKS 1.0 stable release. SELKS is both Live and installable Network Security Management ISO based on Debian implementing and focusing on a complete and ready to use Suricata IDS/IPS ecosystem with its own graphic rule manager. Stamus Networks is a proud member of the Open Source community and SELKS is released under GPLv3 license.
You can download SELKS from SELKS main page.
SELKS is comprised of the following major components:
It offers proven, powerful, innovative and scalable open source multi-threading technologies in a bundle.
SELKS 1.0 comes with 10 pre-installed Kibana IDS/NSM dashboards. They cover analysis of the Suricata alerts and events with per-protocol dashboards (Alerts, HTTP, Flow, SSH, TLS,DNS …). Some dashboards are also dedicated to more specific tasks – like the PRIVACY dashboard:
It shows privacy related information such as which page are leading to well know personal data providers such as Facebook, Twitter or Google.
SELKS provides Scirius – a rules management interface for Suricata. Scirius has been developed by Stamus Networks to provide interaction with Kibana and Elasticsearch. It displays for example statistics on rules and links to existing Kibana dashboards:
Scirius can be upgraded via standard Debian method (
apt-get upgrade). Stamus Networks is also determined to provide the latest stable Debian kernel release for SELKS. Upgrade to the latest stable kernel is easy via the package system. For example, it is possible for the user running the installed version to upgrade the kernel to the latest 3.14 version:
The list of provided Kibana dashboards will be augmented in the future and this will be done seamlessly via the Debian packaging system and Kibana autodiscovery:
We really hope you will enjoy SELKS an enterprise-grade IDS and Network Security Monitoring system in 30 seconds.
Lets talk about SELKS…
Stamus Networks is proud to announce the availability of SELKS 1.0 RC1. This is the first release candidate of our live and installable ISO based on Debian implementing a ready to use Suricata IDS/IPS. More about SELKS you could read on our Open Source page.
This release includes major overhaul and improvements:
SELKS 1.0 RC1 comes with preloaded dashboards and a modified version of Kibana:
SELKS 1.0 RC1 contains Suricata 2.1beta1 which brings flow and alert payload logging – available right out of the box on the predefined dashboards:
Stamus is dedicated to provide the latest releases of Suricata, htp and kernel level. That’s why we provide generic Debian packaging for the newest Suricata IDS/IPS , htp releases and newest long-term kernel level version (3.14.18 at the time of this writing).
SELKS comes with a standard Debian Wheezy distribution with 3.2 kernel – if you would like to upgrade to the latest long-term supported kernel you can just do (for example kernel 3.14.18):
apt-get update && apt-get upgrade
apt-get install linux-headers-3.14.18-stamus linux-image-3.14.18-stamus
For everything else you can just do:
apt-get update && apt-get upgrade
As easy as that!
Stamus Networks is proud to announce the availability of the version 0.8 of Scirius, the web management interface for Suricata. This new release contains a lot of new features as well as bug fixes.
On the functional side, the main new features are:
We hope you will enjoy this new release. As usual it can be downloaded from Github. Happy NIDSing!
To ease the first steps of integration, Stamus Networks is providing a Splunk application: Suricata by Stamus Networks
It can be installed like any other applications and it just requires that a Suricata EVE JSON file is known and parsed by Splunk.
Current version is providing a dashboard and a few searches:
This post describes how to import the application and if you don’t have already done it how to import data from a Suricata EVE file.
Importing the application is done via the Apps menu on top of Splunk starting page:
Suricata by Stamus Networks application is currently provided as a file, so you need to download it: Suricata by Stamus Networks. Once done, you can add the application:
You need to select the file
Since splunk 6.1.x, the recognition of the file format is automatic. If you are using an older version of Splunk, you may need to refer to this page to import Suricata EVE file.
Here’s the detailed procedure to import Suricata EVE data into Splunk. From the starting page, we click on Add Data:
Then we click an Files & Directories to tell Splunk to import data from Suricata EVE JSON file:
Once done, we click on the New button:
Now, we only need to give the complete path to the eve.json file:
Once this is done, we just need to click on all Continue buttons to be done.
Now, we can go to the application by clicking on Suricata by Stamus Networks:
Next step can be to to go the dashboard:
This application should evolve with time, so stay tuned and follow us on twitter for more information.
Stamus Networks is proud to announce the release of SELKS 1.0 beta2. This is the second public release of our Live and installable ISO implementing a ready to use Suricata IDS/IPS.
SELKS 1.0 beta2 can be downloaded:
MD5 sum of the SELKS-1.0beta2.iso file is 38222aeda399f7502913c91465ac9499.
If this new release features some improvements in the creation process, the main new things for the user are an updated version of Scirius and a custom Kibana interface. A menu to switch from one interface to the other has been added on both application. A link has been added in the detail of alert event to be able to jump from Kibana to the correct place in Scirius rule management. The following screencast demonstrates these features:
On Suricata side, file extraction and Unix socket are now enable by default. So SELKS 1.0-beta2 will extract to disk files from stream if signatures containing the filestore are used. The activation of Unix socket allows user to get data from Suricata and/or to use alternate running modes like multiple pcap processing.
The complete Changelog is as follows: