View on GitHub →

🛡️ Security Monitoring Lab (Wazuh + Cowrie Honeypot)

Overview

Designed and implemented a security monitoring lab to simulate attacker behavior and analyze how events are captured, processed, and detected within a SIEM.

The environment consists of a Cowrie SSH honeypot generating attacker activity and a Wazuh SIEM ingesting, analyzing, and generating alerts based on that activity through custom detection rules.


Lab Architecture

Lab Diagram


Key Components

Cowrie Honeypot (Ubuntu VM)

Wazuh SIEM (Ubuntu VM)

Detection Pipeline


Detection Engineering

Created a custom Wazuh rule to detect command execution within the honeypot environment:

json ^cowrie\.command\.input$ Cowrie command executed: $(input)

Validation

Attack Simulation

Simulated attacker activity by connecting to the honeypot via SSH and executing commands:

ssh -p 2222 root@localhost
whoami
exit

SSH Simulation


Log Ingestion Verification

Confirmed that Cowrie logs were successfully ingested and parsed by Wazuh.

Wazuh Events


Alert Generation

Validated that custom detection rules triggered alerts based on attacker commands.

Detection Alert


Key Skills Demonstrated


Summary

This project simulates a real-world security monitoring pipeline by integrating a honeypot with a SIEM to capture, analyze, and detect attacker behavior.

It demonstrates practical experience in log ingestion, detection engineering, and alert validation, reflecting core workflows performed by SOC analysts in identifying and responding to security events.