How to implement the kill chain use case methodology in your SIEM

A “kill chain” describes the structure of an intrusion and the corresponding model.  The kill chain is a useful way to group disparate security events into a context that centers on the attacker and/or the attack. The HP SIEM Kill Chain Methodology consists of numerous phases of an attack for which use cases can be developed. 

 

These phases are:killchain.png

  • Reconnaissance or anomaly communication from an external source to target hosts
  • Attack Delivery
  • Exploitation
  • Installation
  • Command and Control (C2)
  • Local compromise
  • Internal Reconnaissance
  • Lateral Movement
  • Establish Persistence
  • Stage and Exfiltration

 

The new HP SIEM Kill Chain use case methodology whitepaper defines each of these phases and then walks through two examples of an attack.  It outlines what rules can be set in your ArcSight SIEM at each stage of the kill chain to detect these attacks.  By setting up monitoring rules at multiple stages in the kill chain, you increase your chances of catching the attack in progress and ultimately reduce the risk of a successful attack.

 

Read the full whitepaper at: HP SIEM Kill Chain use case methodology

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation