Detection Use Cases

While many security products have built in detection use cases, there will always be situations where a custom detection use case will need to be developed. In order to create a successful use cases, we need to have a few key elements.

Theory

The first step in building a use case is the theory behind it. While the protocol, device, and situation may vary, there are a handful of detection theories that we can apply to most detection situations.

  • Alert on match - Matches any specific string or data field entry

  • Alert on match with exclusion - Same as above excluding anything documented as acceptable

  • Repetitive matches - When occurrences of a set of events goes past acceptable volumes

  • High Fluctuation - When there is a significant change in volume of a specific data field

  • Low Fluctuation - When the volume of occurrences drops to abnormal levels or stops entirely.

  • New or Changed Fields - When a data field has a new, previously unseen entry.

  • Aggregation Thresholds - Changes in Min/Max/Average of a data field statistic.

Alert Tuning

The most effective security monitoring programs, undergo a constant state of tuning and refinement. This allows the highest degree of detection while not overwhelming your analysts with alerts to investigate. High volumes of false positives are typically either a poorly written rule, or noise in your environment that needs to be tuned out. All alerts should have a set of exclusions that should be placed within the use case logic to accommodate any known issues, and therefore not create an alert on those circumstances.

Sometimes you will have to perform a cost benefit analysis on each use case. Is there value in spending gobs of time on every port scan alert you receive? That is up to you. (You shoudnt)

Detection Guides

pageWindows Event ID logging list

Detection Use Case Collections

If you ever want to take the easy way of development, and simply purchase search rules or copy some that are existing on other platforms, there are a few places available on the web. Many poopular SIEMs have sets of rules included in the software. For more, please review the Event Detection section.

If you are looking to simply purchase use cases from a market place, the foremost of them is SOCPrime. They even have a bounty program for their searches. If you come up with a useful and unique search, you can sell it to them for a tidy profit!

pageDetection Use Cases - Book Reference

Detection Use Case Testing

Detection Use Cases by Category

pageDNSpageHTTP(S)pageEmailpageCommand LinepageAuthentication/LogonpageGeneral Network TrafficpageUser Behavior monitoring

Last updated