Brought to you by Active Countermeasures.
RITA is an open source framework for network traffic analysis.
The framework ingests Bro Logs, and currently supports the following analysis features:
- Beaconing Detection: Search for signs of beaconing behavior in and out of your network
- DNS Tunneling Detection Search for signs of DNS based covert channels
- Blacklist Checking: Query blacklists to search for suspicious domains and hosts
Additional functionality is being developed and will be included soon.
The automatic installer is officially supported on Ubuntu 14.04, 16.04 LTS, Security Onion, and CentOS 7
- Download the latest
install.sh
file from the release page - Make the installer executable:
chmod +x ./install.sh
- Run the installer:
sudo ./install.sh
- Start MongoDB:
sudo service mongod start
To install each component of RITA by hand, check out the instructions in the docs.
RITA contains a yaml format configuration file.
You can specify the location for the configuration file with the -c command line flag. If not specified, RITA will look for the configuration in /etc/rita/config.yaml.
- Operating System - The preferred platform is 64-bit Ubuntu 16.04 LTS. The system should be patched and up to date using apt-get.
- Processor (when also using Bro) - Two cores plus an additional core for every 100 Mb of traffic being captured. (three cores minimum). This should be dedicated hardware, as resource congestion with other VMs can cause packets to be dropped or missed.
- Memory - 16GB minimum. 64GB if monitoring 100Mb or more of network traffic. 128GB if monitoring 1Gb or more of network traffic.
- Storage - 300GB minimum. 1TB or more is recommended to reduce log maintenance.
- Network - In order to capture traffic with Bro, you will need at least 2 network interface cards (NICs). One will be for management of the system and the other will be the dedicated capture port. Intel NICs perform well and are recommended.
-
Option 1: Generate PCAPs outside of Bro
- Generate PCAP files with a packet sniffer (tcpdump, wireshark, etc.)
- (Optional) Merge multiple PCAP files into one PCAP file
mergecap -w outFile.pcap inFile1.pcap inFile2.pcap
- Generate bro logs from the PCAP files
- Set local_nets to your local networks
bro -r pcap_to_log.pcap local "Site::local_nets += { 192.168.0.0/24 }" "Log::default_rotation_interval = 1 day"
-
Option 2: Install Bro and let it monitor an interface directly [instructions]
- You may wish to compile Bro from source for performance reasons. This script can help automate the process.
- The automated installer for RITA installs pre-compiled Bro binaries
- After installing,
rita
should be in yourPATH
and the config file should be set up ready to go. Once your Bro install has collected some logs (Bro will normally rotate logs on the hour) you can runrita import
. Alternatively, you can manually import existing logs using one of the following options:- Option 1: Import directly from the terminal (one time import)
rita import path/to/your/bro_logs/ database_name
- Option 2: Set up the Bro configuration in
/etc/rita/config.yaml
for repeated imports- Set
ImportDirectory
to thepath/to/your/bro_logs
. The default is/opt/bro/logs
- Set
DBRoot
to an identifier common to your set of logs
- Set
- Option 1: Import directly from the terminal (one time import)
- Filtering and whitelisting of connection logs happens at import time, and those optional settings can be found in the
/etc/rita/config.yaml
configuration file.
- Option 1: Analyze one dataset
rita analyze dataset_name
- Ex:
rita analyze MyCompany_A
- Option 2: Analyze all imported datasets
rita analyze
- Use the show-X commands
-H
displays human readable datarita show-beacons dataset_name -H
rita show-blacklisted dataset_name -H
- Use less to view data
rita show-beacons dataset_name -H | less -S
Please create an issue on GitHub if you have any questions or concerns.
To contribute to RITA visit our Contributing Guide
GNU GPL V3 © Active Countermeasures ™