idps-escape

RADAR Scenarios

This directory contains all the artifacts required for deploying RADAR (Risk-aware Anomaly Detection-based Automated Response) scenarios in the IDPS-ESCAPE system. Each scenario integrates signature-based and/or ML-based anomaly detection with automated response capabilities through Wazuh.

Overview

The scenarios/ folder provides a modular, scenario-driven approach to security orchestration. Each scenario includes detection rules, decoders, active responses, agent configurations, and deployment pipelines that work together to detect and respond to specific security threats.

Directory structure

scenarios/
├── active_responses/       # Shared active response scripts
├── agent_configs/          # Agent-side configurations per scenario
├── decoders/              # Log parsing and field extraction rules
├── dockerfiles/           # Container definitions for local detection agents
├── ingest_scripts/        # Dataset ingestion utilities
├── lists/                 # Reference lists (e.g., whitelists)
├── ossec/                 # Manager-side OSSEC configuration snippets
├── pipelines/             # Data processing pipeline configurations
├── rules/                 # Detection rules per scenario
└── templates/             # Index templates for OpenSearch

Folder details

active_responses/

Contains Python scripts that execute automated responses when anomalies are detected. These scripts are triggered by Wazuh rules and perform action as email notifications. This further can be extended to blocking, isolation and termination actions.

Active responses reduce manual analyst workload by automating initial triage and response actions.

agent_configs/

Stores agent-side configuration snippets organized by scenario. Each scenario folder contains:

These configurations are deployed to agent groups through Wazuh’s centralized configuration management system.

decoders/

Contains custom log decoders organized by scenario. Decoders parse incoming log data and extract structured fields for analysis:

Decoders transform unstructured log messages into structured events that rules can analyze.

dockerfiles/

Provides Dockerfiles for containerized deployment of scenario-specific detection agents:

These containers run Wazuh agents pre-configured for their specific detection scenarios, enabling scalable and isolated deployments.

ingest_scripts/

Contains scripts for populating the Wazuh indexer with data:

These scripts are essential for testing scenarios with demo datasets and for training ML models before production deployment.

lists/

Stores reference lists used by detection rules:

Lists provide dynamic, updateable reference data that rules can check without requiring rule modifications.

ossec/

Contains OSSEC configuration snippets that get injected into the Wazuh manager’s ossec.conf. These are needed configurations for Wazuh Manager depending on scenario. It is a binding and controlling configurations, currently it is mainly connecting rules and active response.

These snippets are deployed idempotently via Ansible’s blockinfile module, ensuring repeatable configuration management.

pipelines/

Defines data processing pipelines for ingesting and transforming logs:

Pipelines modify how data flows from Wazuh through Filebeat into OpenSearch, enabling scenario-specific indexing strategies.

rules/

Contains Wazuh detection rules organized by scenario. Each scenario folder includes:

Rules analyze decoded events and generate alerts when suspicious patterns are detected. They integrate with active responses to trigger automated actions.

templates/

Contains OpenSearch index templates that define mappings and settings:

Templates ensure consistent data structures across indices, which is critical for accurate anomaly detection and querying.

A consolidated overview of RADAR scenarios, together with the corresponding manual configuration and deployment instructions, is provided in the dedicated documentation manual.