search menu icon-carat-right cmu-wordmark

Intrusion Analysis and Threat Hunting with Open Source Tools

Video
In Intrusion Analysis and Threat Hunting with Open Source Tools, you will learn how to dig deep into network traffic to identify key evidence that a compromise has occurred, deal with new forms of attack, and search for evidence of breaches.
Publisher

Software Engineering Institute

Watch

Abstract

In today’s threat landscape, sophisticated adversaries have routinely demonstrated the ability to compromise enterprise networks and remain hidden for extended periods of time. In Intrusion Analysis and Threat Hunting with Open Source Tools, you will learn how to dig deep into network traffic to identify key evidence that a compromise has occurred, learn how to deal with new forms of attack, and develop the skills necessary to proactively search for evidence of new breaches. We will explore key phases of adversary tactics and techniques - from delivery mechanisms to post-infection traffic - to get hands-on analysis experience. Open-source tools such as Suricata and Moloch will be utilized to generate data, perform exhaustive traffic analysis, and develop comprehensive threat hunting strategies. By the end of this workshop, you will have the knowledge and skills necessary to discover new threats in your network. To help you prepare for this workshop, we recommend that you are familiar with the basics of network security monitoring, IDS/IPS systems and Linux environments. Familiarization with IDS rules is recommended, but not required. We also recommend the following readings: MITRE Attack Design and Philosophy by Blake Strom, et al https://www.mitre.org/sites/default/f... The Diamond Model of Intrusion Analysis by Sergio Caltagirone, et al http://www.activeresponse.org/wp-cont... Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains by Eric Hutchins, et al https://www.lockheedmartin.com/conten...

Subscribe

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.