CDC Cyber Defence Center Detect Cyber Threat Detection
Home Cyber Threat Detection Threat Hunting Honeypots
What is Threat Detection?
Getting breached is a nightmare scenario, and most
organizations that prioritize their information will put smart people and
technologies to work as a defensive barrier against anyone who might try to
cause trouble. But security is an ongoing process—not a guarantee.
Within the context of an organization's security program, the concept of "threat detection" is multifaceted. Even the best security programs must plan for worst-case scenarios, when someone or something has slipped past their defensive and preventative technologies and becomes a threat.
When it comes to detecting and mitigating threats, speed is crucial. Security
programs must be able to detect threats quickly and efficiently so attackers
don’t have enough time to root around in sensitive data. A business’s defensive
programs can ideally stop a majority of threats, because often they've been seen
before—meaning they should know how to fight them. These threats are considered
"known" threats. However, there are additional “unknown” threats that an
organization aims to detect. This means the organization hasn't encountered them
before, perhaps because the attacker is using brand-new methods or technologies.
Known threats can sometimes slip past even the best defensive measures, which is why most security organizations actively look for both known and unknown threats in their environment. So how can an organization try to detect both known and unknown threats?
There are several methods available in the defender's arsenal that can help:
Leveraging Threat Intelligence
Threat intelligence is a way of looking at
signature data from previously seen attacks and comparing it to enterprise data
to identify threats. This makes it particularly effective at detecting known
threats, but not unknown. Threat intelligence is frequently used to great effect
in Security Information and Event Management (SIEM), antivirus, Intrusion
Detection System (IDS), and web proxy technologies.
Analyzing User and Attacker Behavior Analytics
With user behavior analytics,
an organization is able to gain a baseline understanding of what normal behavior
for an employee would be: what kind of data they access, what times they log on,
and where they are physically located, for example. That way, a sudden outlier
in behavior—such as a 2 a.m. logon in Shanghai from someone who usually works
from 9 to 5 in New York and doesn’t travel for business—stands out as unusual
behavior and something a security analyst may need to investigate.
With attacker behavior analytics, there's no "baseline" of activity to compare information to; instead, small, seemingly unrelated activities detected on the network over time may in fact be breadcrumbs of activity that an attacker leaves behind. It takes both technology and the human mind to put these pieces together, but they can help form a picture of what an attacker may be up to within an organization's network.
Setting Intruder
Traps
Some targets are just too tempting for an attacker to pass up. Security
teams know this, so they set traps in hopes that an attacker will take the bait.
Within the context of an organization's network, an intruder trap could include
a honeypot target that may seem to house network services—especially appealing
to an attacker, or “honey credentials” that appear to have user privileges an
attacker would need in order to gain access to sensitive systems or data. When
an attacker goes after this bait, it triggers an alert so the security team know
there is suspicious activity in the network that should be investigated. Learn
more about the different types of deception technology.
Conducting Threat Hunts
Instead of waiting for a threat to appear in the
organization's network, a threat hunt enables security analysts to actively go
out into their own network, endpoints, and security technology to look for
threats or attackers that may be lurking as-yet undetected. This is an advanced
technique generally performed by veteran security and threat analysts.
Ideally, a well-developed security threat detection program should include all of the above tactics, amongst others, to monitor the security of the organization's employees, data, and critical assets.
Threat Detection Requires a Two-Pronged Approach
Threat detection requires
both a human element, as well as a technical element. The human element includes
security analysts who analyze trends, patterns in data, behaviors, and reports,
as well as those who can determine if anomalous data indicates a potential
threat or a false alarm.
But threat detection technology also plays a key part in the detection process. There's no magic bullet in threat detection—no single tool that will do the job. Instead, a combination of tools acts as a net across the entirely of an organization's network, from end to end, to try and capture threats before they become a serious problem.
A robust threat detection program should employ:
Security event threat detection
technology to aggregate data from events across the network, including
authentication, network access, and logs from critical systems.
Network
threat detection technology to understand traffic patterns on the network and
monitor traffic within and between trusted networks, as well as to the internet.
Endpoint threat detection technology to provide detailed information about
possibly malicious events on user machines, as well as any behavioral or
forensic information to aid in investigating threats.
By employing a
combination of these defensive methods, you’ll be increasing your chances of
detecting and mitigating a threat quickly and efficiently. Security is a
continuous process, and nothing is guaranteed. It’ll be up to you and the
resources and processes you put in place to keep your business as secure as
possible.