Malicious Network Behaviour Detection Playbook
Introduction: The Need for Effective Malicious Network Behavior Detection Capabilities
Table of Contents
1. Initial Detection of Malicious Network Behaviour
Query Option 1: Identify Abnormal Network Traffic Patterns
Query Option 2: Detect Communication with Known Malicious IPs
Query Option 3: Monitor Suspicious DNS Queries
2. Command and Control (C2) Indicators
Query Option 1: Detect Long-Lived Connections
Query Option 2: Identify Beaconing Activity
Query Option 3: Monitor HTTP/HTTPS Traffic for Suspicious Patterns
3. Data Exfiltration Indicators
Query Option 1: Large Outbound Data Transfers
Query Option 2: Detect Anomalous Cloud Storage Access
Query Option 3: Monitor Unusual Protocol Usage
4. Threat Persistence Indicators
Query Option 1: Monitor Backdoor Communication
Query Option 2: Detect Persistent Network Tunnels
Query Option 3: Identify Abnormal Service Connections
5. Incident Response and Containment
Query Option 1: Isolate Compromised Systems
Query Option 2: Correlate Indicators of Compromise (IoCs)
Query Option 3: Timeline Reconstruction
6. Conclusion
Last updated