DEPRECATED - MozDef: Mozilla Enterprise Defense Platform
Перейти к файлу
Jeff Bryner 995c3d9487 update sample config.py to match new alert dict format 2015-03-25 09:00:03 -07:00
alerts update sample config.py to match new alert dict format 2015-03-25 09:00:03 -07:00
benchmarking averez-19-samples: move json2Mozdef.py to /benchmarking/workers/ 2014-04-22 09:15:41 -07:00
bot auto_delete the queue, closes #236 2015-02-03 12:52:12 -08:00
cron add cronjob for alerting on event category statistical deviations over time 2015-02-26 17:04:04 -08:00
docker add a safety update to pip to combat ubuntu old, old pip 2015-03-10 08:46:48 -07:00
docs Add demo.mozdef.com details 2014-10-06 12:11:28 -07:00
examples Add the licensing header. 2015-02-04 18:40:06 +01:00
initscripts minor change to conf file location for supervisord/alerts 2015-01-15 15:31:00 -08:00
lib add category field to the message, closes #251 2015-03-12 12:51:58 -07:00
loginput add application parameter 2014-06-03 09:29:49 -07:00
logs [meteor] gitignore and bug fix when empty ES 2014-03-07 10:25:54 -08:00
meteor add docs URL to alerts, closes #241 2015-03-24 15:37:29 -07:00
mq rm old ini file for old alertWorker 2015-03-22 20:16:28 -07:00
rest add fqdn resolution, closes #248 2015-03-03 12:05:07 -08:00
utils source fqdn for netflow, add a whitelist of netflow senders to accept as an option 2014-09-26 11:15:47 -07:00
.gitignore Ignore the results/ directory in git 2014-08-11 21:21:11 +02:00
.gitmodules Replacing mozdef_lib by mozdef_client 2014-12-17 18:10:31 +01:00
CONTRIBUTING.md averez-issue-23-contributing: add CONTRIBUTING.md 2014-04-14 08:53:42 -07:00
LICENSE Updated license file to conform with MPL 2014-02-25 09:55:02 -08:00
README.md updating the README to reflect production status (since Summer 2014) 2015-02-15 12:05:40 -08:00
analyze_code.sh averez-22-license: Fix license stuff (Closes #22) 2014-04-16 11:40:15 -07:00
requirements.txt update requests to avoid openssl bug 2015-03-10 08:08:48 -07:00

README.md

===================================== MozDef: The Mozilla Defense Platform

Why?

The inspiration for MozDef comes from the large arsenal of tools available to attackers. Suites like metasploit, armitage, lair, dradis and others are readily available to help attackers coordinate, share intelligence and finely tune their attacks in real time. Defenders are usually limited to wikis, ticketing systems and manual tracking databases attached to the end of a Security Information Event Management (SIEM) system.

The Mozilla Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.

Goals:

  • Provide a platform for use by defenders to rapidly discover and respond to security incidents.
  • Automate interfaces to other systems like bunker, banhammer, mig
  • Provide metrics for security events and incidents
  • Facilitate real-time collaboration amongst incident handlers
  • Facilitate repeatable, predictable processes for incident handling
  • Go beyond traditional SIEM systems in automating incident handling, information sharing, workflow, metrics and response automation

Status:

MozDef is in production at Mozilla where we are using it to process over 300 million events per day.

DOCS:

http://mozdef.readthedocs.org/en/latest/