[Discussion] Multi-tiered detection, and some feature suggestions

Richard Bejtlich taosecurity at gmail.com
Thu Oct 30 16:35:26 UTC 2008


On Wed, Oct 29, 2008 at 2:39 PM, David J. Bianco <david at vorant.com> wrote:
> In my organization, we're collecting lots of network forensic information to
> support our intrusion analysis process.
...
> I would like to put that here for discussion, but I'd also like to extend it
> to include the capability of an analyst to flag "indicators" that might
> tie an attacker's various attempts together.  For example, two attacks
> that originate from the same IP might reasonably be considered related,
> even if they are separated by days, weeks or months.  If we find two pieces
> of malware exfiltrating data to the same DNS name, it's a good bet they're
> under the same control.  Email addresses, attachement names, URL patterns...
> there are probably a lot of different types of indicators I'm not even
> considering.
>
> I'd like to see a system that could keep track of indicators, tie them to
> specific "incidents", and then flag additional uses of these same indicators,
> either in future or historical occurrences, including situations where the
> historical events weren't flagged as security alerts at the time.
>

David and everyone,

I think Splunk can serve this function:

http://marc.info/?l=sguil-users&m=122468353412622&w=2

However, I realize Splunk is not free.  SplunkBase applications are,
since they are released through the Creative Commons license.

Sincerely,

Richard



More information about the Discussion mailing list