Stellar Cyber Architecture
Learn more at Stellar Cyber Academy.
The following links take you to courses on the Stellar Cyber Academy technical training portal where you can learn more about this topic by watching the suggested lessons.
Discover the overall architecture of Stellar Cyber Open XDR through a high-level diagram. Understand how components like data analysis, machine learning, and integration with cloud storage systems interact to create a unified security operations framework.
Explore the primary features of the Stellar Cyber Open XDR Platform, including data processing, storage, and key functions like Interflow, data normalization, enrichment, and machine learning. See how these elements work together to support efficient threat detection, security operations, and response workflows.
Learn about modular sensors, which gather data from security, identity, and infrastructure tools across the network. Understand their roles in log collection, traffic analysis, IDS functionality, malware detection, and coordinating responses in both cloud and on-premises environments.
Discover how Windows and Linux server sensors capture server-specific events and send them to the Stellar Cyber Platform. See how these sensors convert server events into Interflow records to enhance detection accuracy across threat monitoring and incident response.
Review how Stellar Cyber collects, normalizes, and enriches data from various sources. Follow the data pipeline from initial collection to storage in the data lake and see how it enables comprehensive threat detection and response.
Understand how Stellar Cyber collects, normalizes, and enriches data into Interflow records within the data lake. Learn about categorizing data into indices such as alerts, traffic, syslog, and Windows events for efficient searching and filtering. This lesson also covers data processing, enrichment with threat intelligence, and storage in indexed structures for efficient retrieval.
Learn how to craft precise search queries using the Interflow Dictionary to find indices, field names, and values for efficient data analysis. Identify values for fields like source IP type, destination country, and event source (Investigate | Threat Hunting) for more targeted searches.
Explore the Interflow dictionary to find specific field values within indices. Use this tool to accurately query values in fields such as source IP reputation, geo-location, and event status, enhancing dashboards and filters for threat detection.
Learn how to apply regular expressions in search queries and validate them with the Interflow dictionary. This demo covers locating patterns in fields such as usernames, IP addresses, and hostnames.
Begin your journey through the Stellar Cyber Platform user interface (UI) with an overview of essential navigation and functionality. Learn the roles of the data processor and data lake, and explore the UI menu structure, charts, tables, alerts, and cases to prepare for efficient security operations.
Explore high-level interactions available in the Stellar Cyber Platform, including the UI, console access, and API. Learn about navigating the data processor, connecting modular and server sensors, managing the data pipeline, and the elements needed for smooth security operations across environments.
Watch a demonstration of UI, console, and API access within the Stellar Cyber Platform. Learn how to set up access to the data processor, configure sensor connections, and use security certificates to maintain secure data flows and manage platform settings effectively.
Discover the resources accessible from the question mark icon, including the knowledge base, learning portal, and support options. Learn to navigate resources for documentation, product feedback, and the Stellar Cyber Academy, helping you find answers to questions and connect with the broader Stellar Cyber community.
Explore a demonstration of the question mark icon, showing how to access Stellar Cyber resources like the knowledge base, documentation, and Stellar Cyber Academy. See the contextualized links that adjust based on your current view in the UI for quick, targeted resource lookup.
Gain an overview of the Stellar Cyber Platform menu bar, with sections like cases, alerts, visualize, investigate, respond, and system. Learn how these menu options connect you to key UI features, including dashboards, threat hunting tools, and response automation.
Watch a demonstration of navigating the Stellar Cyber Platform menu bar. Understand the differences in menu options between on-premises and SaaS deployments and see how features like alerts, cases, visualize, and system are configured based on your deployment environment.
Explore the core tools for data filtering in the Stellar Cyber Platform: filters, search, and time. Learn how to use these tools to sift through large volumes of data from the data lake, enabling you to quickly isolate and analyze security events based on specific criteria.
Follow a demonstration on using filters, search, and time-based data narrowing. See how to apply Lucene syntax for precise queries, adjust time filters, and work with toolbar filters to access and analyze specific data views across the platform.
Learn how to interpret and interact with pie and bar charts within the Stellar Cyber Platform. Use these visual tools to quickly understand data distribution and trends, and explore features that let you drill down for details or broaden your view for overarching insights.
Watch a demonstration of how to navigate and manipulate pie and bar charts. Learn to customize chart displays, interpret various data visualizations, and drill down into specific data points to support real-time analysis.
Discover the features of data tables in the Stellar Cyber Platform UI, a key interface element for SOC analysts and administrators. Learn how to navigate, filter, and customize tables to display meaningful data for enhanced situational awareness and operational efficiency.
Follow a detailed demonstration on working with tables, covering sorting, filtering, and organizing data within table views. See techniques for handling large data sets and using table features to streamline threat analysis workflows.
Dive into the alert details view to understand how to investigate individual alerts. Learn to navigate alert components such as alert scores, source IP, and correlated events, all crucial for comprehensive investigation and threat response.
See a demonstration of the alert details view, where you’ll learn to analyze alert components and use linked data fields to track threats. This demonstration provides practical skills for investigating and responding to alerts effectively.
Learn how to use the Interflow dictionary and cases in the Stellar Cyber Platform. Understand how Interflow records link to cases, visualizing data from raw logs to alerts for in-depth security investigations.
Watch a practical demonstration on using the Interflow dictionary and managing cases. Learn how to trace events across Interflow records and use cases to connect related alerts for more efficient threat handling.
Familiarize yourself with the command-line interface (CLI) and API options in the Stellar Cyber Platform. This lesson highlights alternative access points for configuration, automation, and data integration with external systems.
See a demonstration of the CLI and API interfaces, including configuration and automation options. Learn how to interact with the Stellar Cyber Platform programmatically for enhanced flexibility and data integration.
The first time you access a link on the portal during a session, you must log in to access content.
Stellar Cyber is a unified platform for Security Operations, providing a central location to gather and organize security threat information by unifying together key data, tools and alerts for analysis. Stellar Cyber also automates both threat detection (using AI and machine learning) and response (using automated threat hunting). This helps reduce the noise so you aren't overwhelmed by the amount of information and can find and focus on the real threats. You can even teach the machine learning to present only the information that truly interests you.
High Level View
The essential first step in implementing security is to gather information. The following figure shows the conceptual model and components that Stellar Cyber uses in the collection phase.
As with any monitoring system the data flow starts with real-world events. The following explains the functions and roles of each major element in the diagram.
- Stellar Cyber Sensor: There can be any number of sensors in the network. There are also different types of sensors as described in the sections below. Regardless of the type the basic function is the same: When observed events occur, the sensor generates Interflow records and sends them to a receiver. Sensors are discussed in greater detail in a section below.
- Receiver: This is a task running in the DP that passively listens for input from sensors. There can be any number of receivers instantiated in the system and each one may serve any number of sensors. There are currently two types of receivers: packet and JSON. The JSON form is used to process Interflow records from sensors. It defines the IP address and port number that sensors use to connect to the DP. The packet form of receiver (not shown in the figure above) is used to receive raw network packet data from a security sensor.
- Connector: Similar to a receiver, except that it's active, a connector is also a software task. It actively collects information from an external data source and generates Interflow records. There can be any number of connectors configured but one is required for each external data source. There are several different types of connectors, each developed for a different type of data source. Connectors are discussed in a section below in greater detail.
- Data Lake and Indices: The Data Lake is the repository of the information that Stellar Cyber stores. The data is organized into indices, which are categories that Stellar Cyber uses to group data. The indices help make searching much more efficient and effective. An index that stores information directly from the sensors or collectors is referred to as a "raw" index. The security index contains enhanced data based on data from one or more of the raw indices.
- Machine Learning: Stellar Cyber uses machine learning and AI to examine the records in the Data Lake and make a determination of whether it sees evidence of a security breach. When breaches are detected, Stellar Cyber generates alerts. Alerts are reported in the Alerts page and the home dashboard. In addition, Stellar Cyber stores alert records in a special index. There are many different types of machine learning algorithms, each programmed to look for a different class or type of threat.
Together, these components collect information and store it in the Data Lake on a continuous basis, organized in a form suitable for security breach detection.
User Interface
The DP runs an embedded web server that any browser with sufficient capability can use. The system supports any number of connections on the standard TCP ports for the https
protocol.
After the initial download of the JavaScript application, all further communication with the DP consists of REST API calls to fetch data and issue commands. The REST API is proprietary.
Interflow
Interflow is the record format used by Stellar Cyber to represent raw data, events, and anomalies. On the network, Interflow is expressed as a JSON object (sometimes referred to as a "hash") that can contain a large variety of keys. The values stored by each key can be any form of object (string, number, or other object).
The Event Display component can display the Interflow record in either tabular or raw JSON form. A key purpose of the Interflow record is to provide evidence for an event of interest. The extensible nature of the Interflow record is used by Stellar Cyber to implement its data enhancement and machine learning (ML) functions. The ability to add fields during its life cycle is also used to adapt connectors that contain new definitions. As a result Interflow is future-proofed and able to handle new requirements when needed.
Although the names of the keys are largely intuitive for security analysts, a dictionary of the Interflow keys can be found on its own Interflow page. The Interflow Dictionary function on the Threat Hunting screen also provides a list of Interflow keys to choose from when searching for threats in the Data Lake. The list of keys will evolve with new versions of Stellar Cyber.
Sensors
Sensors are the components that collect information from key points in the monitored network, compose Interflow records, and send them to the DP. There are several different types of sensors, each with different capabilities and suited for individual environments. The types include the following:
- Linux Server Sensor – This agent runs within a compatible Linux distribution environment. It is usually configured with a preset maximum amount of resources it can use (for example, no more than 5% of CPU resource) and can collect many different types of information including logs and command execution events.
- Windows Server Sensor – This agent runs within the Windows environment. The current version exclusively looks at Windows events supported by the Microsoft-defined APIs. Many different threats can be observed from this interface.
-
Modular Sensor – Modular Sensors let you customize the features you want on the sensor, allowing you to scale VM requirements. Modular sensors can be configured with the following features: Log Forwarding, Network Traffic ingestion, Sandbox, IDS, Aggregator, and tenable.io Nessus scans.
Previous releases also included Network and Security sensors. The features associated with these sensors can all be enabled in the Modular Sensor Profile for a Modular Sensor. For your convenience, here is how Stellar Cyber defined Network and Security sensors in previous releases:
-
Network Sensor – A network sensor is dedicated to collecting network packets and compiling them into Interflow records to be sent to a receiver.
-
Security Sensor – This type of sensor has the capabilities of a network sensor with additional security features integrated, including IDS and sandboxing. A security sensor can also send packet data to the DP.
-
Although all sensors are ultimately software components that can be run in compatible hosts and hypervisor environments, they can also be packaged in purpose-built hardware for convenience in deployment.
Sensors capture data via the following methods:
- Port mirrors
- Network taps
- Virtual network taps
- Agents
- VXLAN
- GRE
- Logs
- Netflow/IPFIX
Sensors are automatically recognized by Stellar Cyber when they are installed and programmed with the IP address of the DP (this is referred to as the CM, or Configuration Manager, by the sensor). Once recognized, the sensor must be authorized by the Stellar Cyber Configuration Manager. The process of authorization assigns a license to the sensor. See the Sensor Overview page to see how this is done and for links to how you configure sensors, sensor profiles, and filters.
To see which alert types you can get with each sensor, refer the Stellar Cyber alert coverage page.
Encrypted Traffic
Stellar Cyber does not directly decrypt traffic, but can handle it in multiple ways:
- Deploy agents behind proxies
- Detect applications
- Partner with 3rd party decryption
Deploying Agents Behind Proxies
The Stellar Cyber sensor doesn't need to decrypt traffic when you deploy it behind your proxy server. The traffic is already decrypted by the proxy server when it gets to the sensor, and the sensor can add user and process context to the traffic.
Detecting Encrypted Applications
If you cannot deploy the sensor behind the proxy servers or you are not using proxy servers, Stellar Cyber network sensors can still identify encrypted applications by analyzing the encrypted traffic patterns and TLS/SSL handshaking.
The sensor extracts useful metadata, such as the server certificate, IP addresses, domain names, session duration, and byte counts from the packet header and TLS/SSL handshaking. The IP addresses are enriched with geo location, threat intelligence, host name, user name, and more, to create rich context for alerts and actions. Our machine learning based network traffic analysis and user behavior analysis apply to the encrypted traffic with the extracted metadata and enriched context. In addition, JA3 fingerprinting is used to identify malware with encrypted traffic.
Partnering with 3rd Party Decryption Tools
Stellar Cyber sensors work with many 3rd party decryption tools, such as F5 SSL Orchestration and Gigamon VAF, taking the decrypted traffic and analyzing it.
Connectors
As with sensors, connectors are a method of collecting information based on real world events and compiling them into Interflow records directed at the Data Lake. There are several connector categories in Stellar Cyber. For the protocols that are supported by a commercial vendor, each interface is supported for the purpose of enhancing the security of their own services.
Connectors are tasks that run within the DP itself. Each connector class uses a protocol defined by the external data source and requires configuration with IP address and authorization credentials.
Assets
An asset is a server, router, host system that appears in the private network being monitored by Stellar Cyber. Assets are automatically registered in Stellar Cyber by sensors. The information used to identify them include MAC address, IP Address, and host name (if available). They can be de-authorized or ignored by user command if needed. Hosts outside the private network are not considered assets. Using the Asset Analytics screen, the user can examine assets for threat data and also examine performance history.
Alerts
Alerts are a critical component of Stellar Cyber's ability to discover important events in a sea of data. Using ML techniques as well as algorithms developed over long experience, Stellar Cyber examines raw event data for evidence of security breaches. Insignificant events are passed over and sifted for anomalies. When anomalies are found, Stellar Cyber generates alerts that are entered into the Alerts Index and reported in the Stellar Cyber user interface.
Alerts help drive the action in the home dashboard, the Alert Types page, and the Cases interface. Stellar Cyber uses AI to score the alerts to help you prioritize actions and responses.
There are many different types of alerts available in Stellar Cyber, organized by XDR Kill Chain Stage, Tactic, and Technique, with each focused on a specific type of security threat. The figure above shows the organization of the alerts in the Alert Types page.
Cases
Stellar Cyber also leverages ML to correlate disparate alerts into a coalesced case.
A case is a set of multiple correlated alerts and entities constituting a potential unified security attack, ranked by a dynamically updated score indicating the severity of the attack. Stellar Cyber uses its machine-learning capabilities to generate cases automatically, grouping related alerts into a unified case for improved attack resolution.
Stellar Cyber reports cases in the Home dashboard, as well as in the Case Management interface, giving you a powerful tool to organize and respond to security events.
Firewall Actions
Stellar Cyber has the capability of interfacing with firewall rules. Once configured, the Stellar Cyber can mitigate security breaches by blocking malicious traffic as soon as it is identified. Two modes supported include:
- You can manually trigger a firewall action from the event display.
- An Automated Threat Hunting Playbook may specify a firewall response to be taken automatically when some condition is met.