Integrating SIEM into Your Threat Hunting Strategy

WHITE PAPER Integrating SIEM into Your Threat Hunting Strategy Cyberthreat hunting is the process of proactively and iteratively searching through networks and data sets to detect threats that evade existing automated tools.1 While that sounds straightforward, it is fraught with complexities that are neither obvious nor easy to remedy. For example, what are the data sets? Where do they come from? How do you search through them iteratively? How can you be proactive? In this paper, we offer both an approach and a toolkit for threat hunting. We show you how to aggregate and correlate the data your tools provide into a single analysis tool—an advanced security information and event management (SIEM) platform—to detect and block cyberthreats. We show you how a solid threat-hunting infrastructure can help you achieve the proactive goal of the definition and how to advance the proactive defense infrastructure of your enterprise. While the centerpiece for your threat-hunting toolkit is an SIEM, we will use some open source tools to collect data and show how commercial tools can fit in as well. Remember, threat hunting is a team sport. Sharing results of your hunts with other hunters—perhaps using different tools—can only gather more information for you both. Also, and equally important, there is a lot of data, and that means that you could take a lot of time to sift through it and get useful results. Anything that you 3 Integrating SIEM into Your Threat Hunting Strategy can do to shorten the hunting cycle without sacrificing accuracy or thoroughness is a good thing. What Are Data Sets in the Context of Threat Hunting? Experienced threat hunters have their data set preferences, but what is most important is defining the types of data you are seeking. The overall objective of your threat management strategy will dictate, to a large degree, what types of data you need. The data dictate the data sets, and the data sets dictate the tools. There is a misconception that you should start with the tools and work the other way. However, if you don’t know what you’re looking for, how can you know what tool to use to find it? Additionally, do you want to be able to apply forensic analysis to your data? The answer to that is usually “yes,” but that affirmative opens up a new level of complexity. There is a misconception that you should start with the tools and work the other way. However, if you don’t know what you’re looking for, how can you know what tool to use to find it? WHITE PAPER Generally, we think of the following types of data sets as useful for threat hunters: ¦¦ ¦¦ Resources on hosts and endpoints such as PowerShell transcripts, logs, and more Firewall and intrusion detection systems (IDS)/ intrusion prevention systems (IPS) logs ¦¦ Malware lists and captures ¦¦ Passive DNS ¦¦ Whois ¦¦ Web logs (access, proxy, referrer, and others) ¦¦ Process execution logs ¦¦ Authentication and Active Directory logs ¦¦ Registry modifications ¦¦ Syslog and Microsoft Windows event logs ¦¦ Netflow ¦¦ Network events ¦¦ Other security device logs ¦¦ Malicious domain lists ¦¦ Crowd-sourced malicious activity lists There are many sources for these data, and you can access the data in a variety of ways. For example, there are simple ways to collect all malicious scans and attempts against your perimeter and compare that with the same type of data collected inside your enterprise. Some of those ways are free, so there is no need to extract that data from expensive tools such as IDS. That is not to say that IDS is not useful. What we are saying is this: select the right tool for the specific task. 4 Integrating SIEM into Your Threat Hunting Strategy Another important point is that more data is always better than less data. Never mind that huge data sets are tedious to analyze. Our tools will do that analysis for us. For example, a free tool called Maltrail will collect every attack/probe attempt against us. We set it on the outside perimeter of our test network. In a typical 24hour period on our test network, with just one sensor exposed to the internet, it averages more than 6,000 events. Consider multiple sensors on a much larger footprint, such as we would see in a typical enterprise, and we likely would see well into the hundreds of thousands and, perhaps, millions, of events daily. The tool breaks that down for us and, feeding the output of the tool to an SIEM breaks it down even more, enabling us to do a cogent analysis. More important, Maltrail, on a typical day, might find one high-risk event and, perhaps, five or fewer medium risk events. The rest will be low. Building a Threat Hunting Toolkit To capture the data, you need a very comprehensive toolkit. That toolkit consists of cyberthreat intelligence feeds, in-house capture and logging systems, analysis tools, and correlation tools. In this section, we’ll examine some of the available tools to stock your threat lab. As you become more integrated into threat hunting, you will develop additional favorites that you can add to the list, making it more personalized for you and your organization. You may, also, determine that some of the tools we discuss are not necessary for your environment. Also, you should note that the tools that we are examining in this paper represent a sampllng of what is available. There are lots of different tools, and many of
Please complete the form to gain access to this content