Skip to content
forked from cisagov/Malcolm

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

License

Notifications You must be signed in to change notification settings

idaholab/Malcolm

Folders and files

NameName
Last commit message
Last commit date
Nov 4, 2024
Oct 22, 2024
Sep 23, 2022
Jun 26, 2024
Oct 23, 2024
Oct 11, 2024
Oct 16, 2024
Oct 16, 2024
Nov 5, 2024
May 12, 2024
Jun 11, 2024
Jul 30, 2024
Dec 5, 2023
Nov 5, 2024
Nov 5, 2024
Dec 5, 2023
Oct 21, 2024
Oct 21, 2024
Nov 5, 2024
Aug 16, 2024
Jul 27, 2024
Jul 21, 2021
Jul 21, 2021
Mar 20, 2024
Jun 5, 2024
Dec 7, 2023
Oct 24, 2024
Oct 22, 2024
Jul 27, 2022
Sep 17, 2024
Aug 31, 2020
Jul 27, 2022
Oct 15, 2024
Aug 14, 2024
Feb 16, 2024
Jun 12, 2019
Jan 18, 2024
Dec 5, 2023
Nov 4, 2022
Dec 5, 2023
Dec 5, 2023
Aug 16, 2024
Oct 23, 2024
Oct 21, 2024
Oct 21, 2024

Repository files navigation

Malcolm

Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind:

  • Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files, Zeek logs, and Suricata alerts. These artifacts can be uploaded via a simple browser-based interface or passively captured live and forwarded to Malcolm using lightweight forwarders. In either case, the data is automatically normalized, enriched, and correlated for analysis.
  • Powerful traffic analysis – Visibility into network communications is provided through two intuitive interfaces: OpenSearch Dashboards, a flexible data visualization plugin with dozens of prebuilt dashboards providing an at-a-glance overview of network protocols; and Arkime, a powerful tool for finding and identifying the network sessions comprising suspected security incidents.
  • Streamlined deployment – Malcolm operates as a cluster of software containers – isolated sandboxes that each serve a dedicated function of the system. This container-based deployment model, combined with a few simple scripts for setup and run-time management, makes Malcolm suitable to be deployed quickly across a variety of platforms and use cases; whether it be for long-term deployment on a Linux server in a security operations center (SOC) or for incident response on a Macbook for an individual engagement.
  • Secure communications – All communications with Malcolm, both from the user interface and from remote log forwarders, are secured with industry standard encryption protocols.
  • Permissive license – Malcolm is comprised of several widely used open-source tools, making it an attractive alternative to security solutions requiring paid licenses.
  • Expanding control systems visibility – While Malcolm is great for general-purpose network traffic analysis, its creators see a particular need in the community for tools providing insight into protocols used in industrial control systems (ICS) environments. Ongoing Malcolm development will aim to provide additional parsers for common ICS protocols.

Although all the open-source tools that make up Malcolm are already available and in general use, Malcolm provides a framework of interconnectivity that makes it greater than the sum of its parts.

In short, Malcolm provides an easily deployable traffic analysis tool suite for network security monitoring.

Documentation

See the Malcolm documentation.

Share your feedback

You can help steer Malcolm's development by sharing your ideas and feedback. Please take a few minutes to complete this survey ↪ (hosted on Google Forms) so we can understand the members of the Malcolm community and their use cases for this tool.

Copyright and License

Malcolm is Copyright 2024 Battelle Energy Alliance, LLC, and is developed and released through the cooperation of the Cybersecurity and Infrastructure Security Agency of the U.S. Department of Homeland Security.

Malcolm is licensed under the Apache License, version 2.0. See LICENSE.txt for the terms of its release.

Contact information of author(s):

[email protected]