Zero Day Attacks
Security Analytics is a world-class network monitoring suite capable of identifying all sorts of traffic and log events. It is a suite of tools that help analysts and incident responders do their jobs. What is your organizations security team currently doing to prevent, detect, and respond to incidents and threats today?
Threat analysis should be part of an overall Risk Management program and should include detection and response.
If you feel your organization could benefit from an assessment to help answer your question, I would strongly encourage you to reach out to our Advanced Cyber Defense team and arrange an engagement. Tools help fight the battles, but strategy wins the war.
Hello Christopher,I appreciate your help in helping me clarify my query.However I want to know that with our current setup of RSA SA what is the source of update in case there is a zero day attack.Is it only through RSA live notifications.If that is the case we expect to get input about new ESA rules,app rules etc.Is it ?
As per Christopher I agree on that "Security Analytics is a world-class network monitoring suite capable of identifying all sorts of traffic and log events". Though for zero day attack we cannot go for the specific ESA rules, App rules and capture attack, for this we need to create multiple scenarios using perimeter devices and internal device's logs.
For example :
For signature based detection we can use detection systems such as Anti-Virus, Intrusion Prevention Systems, Content Inspection Systems and Application Firewalls or if we identify suspicious behavior by users and computers that may have been compromised by a zero day exploit then the only method is that to determine 'intrusion' i.e. Large file transfers detected by network flows, attempts at accessing data outside of a compromised user’s environment, disabling of services, installation of software and other infrequent acts imply compromise.
Also if you are using packet in your environment then it is best to use feeds for IOCs(Indicator of compromise), BOCs(behaviour of compromise) and packs specifically configures for such malicious activities. Else you can use manual feeds for malwares, blacklist IPs, domains etc and from RSA live also in order to monitor threat category, threat description and create dashboard, correlation and rules and monitor the traffic, trend and analyze the risk and behavior. You can also go for some basic activities check in the environment i.e.
1.) Determine Malicious Authentication Attempts.
2.) Identify Compromised Account Activities.
3.) Determine Data Exfiltration and Methods (Use proxy logs to determine data exfilteration or any http outbound activity)
4.) Malware search dashboard for any compromised endpoint.
etc. Likewise you can create many checkpoint for malicious attacks, ransomwares, variants attacks etc.
Hi the very nature of it being a Zero day attack means that no signature based system will be aware of it. You need to know what is normal in your environment and whitelist all this normal stuff, so that you then start looking at abnormal traffic.
Having Netwitness Endpoint on your endpoint machines will help to detect abnormal behaviour as it only looks at the behaviour of applications and it not signature based.
However, there is no one size fits all solution. Buying more technology is not always the answer. I think you need to understand your own environment and know what normal behavior is, so you can concentrate on the more unusual stuff.
This is a hard task, so being able to prioritize by critical assets and automate as much as possible is worthwhile.
Live would be one way to receive updated content. There could also be other posts to this community site by members like yourself, around detection. This could be parsers, feeds, app rules, ESA rules, etc.
A zero-day attack could take many forms depending on the target. It could be in a windows executable that exploits code, office files, Flash, java and several others. It could be in the form of malicious web traffic that exploits a web application server. Or it could be something we haven't seen before.
You could also become aware of new attacks from research and intelligence from any number of sources. By placing your packet decoders to monitor all traffic inbound and outbound, you have a high likelihood of capturing the traffic involved in such an attack. From there, I would typically start looking at what my attack surface looked like. This would involve understanding what services and applications are exposed. After applying as much locking down of systems and applications as possible, I still need that visibility...not only in the network traffic, but the happenings on the host systems as well. Systems would generate logs. I will need those. Systems have certain processes and services running. I need to baseline that and understand what normal looks like. I allow email to enter my environment that may include attachments or links. I need to validate that.
Once we know what now how the systems within our organization should operate normally, it will make it easier to determine when the abnormal occurs. This is what should start an investigation.
I don't know of a tool that would call out "THIS IS A ZERO DAY ATTACK". Once we understand what normal system activity looks like, we can remove that hay and focus on the needles. Then, when we find that needle, we create some meta (parser, feed, app rule, ESA rule) to make it easier to find again.