Friday, February 17, 2017

Arcsight Threat Tracking Method

This Activate Method is used to track attackers and target system state and their progression through the attack life cycle. It consists of a set of rules that update the attacker and target threat scores as well as their progression and indicator and warning frequency within the attack life cycle. All this information is tracked in a set of lists with varying TTL for the entries.
For this to work efficiently, indicators and warnings have predetermined categorization requirements. For example, an IDS reporting shellcode over the wire is tagged with Category Custom Format Field = "/Attack Life Cycle/Delivery". The rules look for these conditions populate attacker and target information in the appropriate lists as well as the threat score tracking information.
ThreatTrackingEventFlow.jpg

Attack Life Cycle

The Attack Life Cycle lists are very straight forward. There is one list for each phase of the attack life cycle and the rules for getting attackers and targets into the lists follow two simple laws:
  • Attackers and Targets can live in multiple list at the same time
  • Only Activate rules will populate the lists
NOTE:
  • Custom Category Format Field will be used to move data into the appropriate list
  • All content is stored under:
    /All /ArcSight Activate/Use Cases/Threat Tracking/Attacke Life Cycle/ System Perspective/
ListsDescription
Phase 1 ReconnaissanceWill track attackers and targets that are conducting research and identification of targets. If the attacker's target can be derived from the event/analysis, then the target will also be tracked. Typically, these indicators and warnings and found by monitoring NIDS, HIPS, firewall ACLs, and web analytics.
Phase 2 WeaponizationWeaponization is not normally 'viewable' as the attacker normally creates weaponized packaged on systems that we are not in control of. This category will be used for file analysis tools that detect known IOC. (Mandiant, STIX, Tripwire)
Phase 3 DeliveryIndicators and warnings that intercept the transmission of executable code to a target. NIDS/HIPS/Proxies/in-line AV events are sources capable of detecting these events.
Phase 4 ExploitationExecution of the attackers code. This list will track when code is executed either by the user or by exploiting a particular vulnerability. Indicators are warnings are detected at the OS/HIDS level. (SRP/ASLR/DEP)
Phase 5 InstallationInstallation of remote access code. This can be detected at the OS/HIDS/AV
Phase 6 C2Track attackers and hosts that are displaying beaconing characteristics. These are often detected by NIDS/FW acl/Honeypots/DNS, and detection can be enriched with external intel data
Phase 7 ObjectivesPost "pawnage" activities (data exfil, corruption, destruction, pivots).

6 comments:

  1. A very good and informative article indeed . It helps me a lot to enhance my knowledge, I really like the way the writer presented his views. 24x7 Security Operations Centre, aims to provide you with the best cyber security solution for your business needs.

    ReplyDelete
  2. Nice article please do visit my website for cyber security certification training

    ReplyDelete
  3. Thank you for sharing informative post! You must also know about cyber security Gap Analysis that is a useful technique that enables us to recognize the gap between current situation and the future state of organizations.

    ReplyDelete

  4. This post is so helpfull and informative.keep updating more information...
    Type Of System Testing
    System Tester

    ReplyDelete