This project develops a plugin, a Driver and an API to connect a MSPL Policy agent and the mmt-tools installed in a server, making it possible to use .xml policy files to generate new security rules to be used by the MMT-Tools.
Here is an overview of how this project works:
By passing a MSPL Policy File to the mmt-mspl-plugin you will generate two files:
- a new mmt-security rule that uses the given policy
- a mmt-probe.conf that applies only the new rule to be used by MMT-Security
After genrated, those files can be sent to the server running the mmt-tools by using the mmt-mspl-drive, it exposes and API documented by Swagger.
To set up the MMT-Tools check: Docker-MMT-Tools
To run tests, run the following command
cd mmt-mspl-driver-plugin/
python3 mmt-agent.py -r inputs/pingofdeath.xml
Img 1: Screenshot of mmt.agent.py output when applied the pingofdeath.xml, a MSPL Policy to apply a rule for ping of death attack detection.
Img 2: Screenshot of MMT Operator UI Security tab after applying the generated rule (ping of death attack) and sending a ping with size greater than 350 bytes (command: ping -s 400).
cd mmt-mspl-driver-plugin/
python3 mmt-agent.py -r inputs/snort_policy_nmapsyn.xml
Img 3: Screenshot of mmt.agent.py output when applied the snort_policy_nmapsyn.xml, a MSPL Policy to apply a rule to detect TCP SYN Scans.
Img 4: Screenshot of MMT Operator UI Security tab after applying the generated rule (TCP SYN Scan) and starting a scan on the target machine (command: sudo nmap 10.208.89.15).