ARTLAS: Apache Real Time Logs Analyzer System

ARTLAS Apache Real Time Logs Analyzer System

Real-time Apache log analyzer, based on top 10 OWASP vulnerabilities, identifies attempts of exploration in your web application, and notify you or your incident team on Telegram, Zabbix, and Syslog/SIEM.

ARTLAS uses the regular expression from the PHP-IDS project, to identify the attempts of exploration, download link to the latest version of the file Download File

Supported Output

Zabbix Version 2.4 and 3.0
SySlog
SIEM
Telegram

Supported web servers

Apache
Apache vHost
Nginx
Nginx vHost

Installation

Clone project

git clone https://github.com/mthbernardes/ARTLAS.git
Install dependencies
pip install -r dependencies.txt
python version 2.7.11(lastet)


Install screen
sudo apt-get install screen #Debian Like
sbopkg -i screen # Slackware 14.*
yum install screen # CentOS/RHEL

dnf install screeen # Fedora

 

 

Configuration

All your configurations will be made in etc/artlas.conf file.

TELEGRAM INTEGRATION
[Telegram]
api = Your Token API
group_id = Group/User ID that will receive the notifications
enable = True to send notificantions or False to not send.


ZABBIX CONFIGURATION
[Zabbix]
server_name = hostname of the server in zabbix
agentd_config = Zabbix agent configuration file
enable_advantage_keys = True or False to use advanced triggers
notifications = true to enable or false to disable triggers notifications
enable = true to enable or false to disable


SYSLOG/SIEM CONFIGURATION
[CEF_Syslog]
server_name = IP or Hostname SySlog/SIEM server
enable = True or False to enable


GENERAL CONFIGURATION
[General]
apache_log = Full path apache access.log
apache_mask = Mask to identify the fields in the apache access log
vhost_enable = True to enable or False to disable vhosts
rules = etc/default_filter.json It's the file that contains the OWASP filter [Do not Change]

 

How to start

screen -S artlas

python artlas.py
CTRL+A+D

 

ARTLAS

Copyright (c) 2016 Matheus Bernardes

Source: https://github.com/mthbernardes/