Workshop On Cybersecurity For Critical Infrastructure Theme: 5G Networks


Vajra launch & Inauguration
Vajra is an indigenous cybersecurity tool built to manage, detect, and respond to endpoint threats. Vajra’s core strength is in its ability to gather fine-grained contextual information from the endpoints in real time and robust rules to detect malicious activities. Vajra’s agent is lightweight and supports both Linux and Windows. It makes the system activities logs available as a queriable database, making it easier to detect potential threats and perform incident response using SQL queries. Vajra’s inbuilt detection rules include all the Tactics, Techniques, and Procedures of MITRE ATT&CK frame and allow new rules to be added on the fly without disruptions. Vajra also provides complete invisibility of activities within the docker container, enabling the security of containers.
More details about Vajra are available at www.getvajra.com
To install Vajra visit https://github.com/VajraSecurity/Install (to be made public)
We acknowledge funding support form NCETIS and TCA2I at IIT Bombay and CDSL.
Vajra agent collects logs of the endpoints at the kernel level using a custom-built Osquery. The logs are centrally monitored and correlated across the endpoints to detect any malicious activities, lateral movements, and privilege escalations. Vajra generate alters for any malicious attacks based on rules sets covering the major tactics and techniques of the MITRE ATT&CK framework. Further, the threat hunting features of Vajra help in faster investigation of incidences.
The main features of Vajra are: — Real-time pre-infection filtering and protection of all devices without manual intervention. — Continuous update of detection techniques for new malware attacks — In-house R&D and support for new threats — Scalable and cost-effective. Supports multi-tenancy — Customizable to the needs of organizations — Easy integration with other SIEM tools — Supports indigenous BOSS operating systems. Vajra is designed to support container security and automated threat detection based on AI/ML techniques.


