SlideShare a Scribd company logo
Leveraging logging for
threat detection
Chris Bassey
Overview
● Cyber threats
● Cyber attacks
● Threat detection
● Logging
● Threat detection using logs
● Demo
● Limitations of logging
● Conclusion
Cyber threats
A cyber threat is the possibility that malicious activity from threat actors targeting
your digital assets and infrastructure may occur. Threats may include the possibility
of:
● Phishing.
● Malware infections.
● Data breaches, theft and damage.
● (Distributed) denial of service attacks.
Cyber attacks
Cyber attacks are malicious and unwanted activities from actors seeking to
compromise the confidentiality, integrity and availability of digital assets and
infrastructure.
Examples include:
● Ongoing phishing and impersonation campaigns.
● Malware actively running on your endpoints. (Ransomware, RATs, infostealers)
● Ongoing (D)DoS attacks.
● Data exfiltration.
● Ransomware.
Threat detection
This is the process of identifying threats that are trying to attack your assets and
infrastructure. It might be the detection of:
● Downloaded malware that has not yet been run.
● Running malware exfiltrating data.
● Running malware connecting back to a C2 server.
● A stager retrieving a second stage payload.
● An ongoing phishing campaign.
Threat detection (Methodologies)
● Threat intelligence (early stage, pre-attack)
● Signature based detection
● Anomaly based detection
● Behavioural based detections (thin line between this and ML based detections)
● ML based detections (early days for this?).
Threat detection (Tools)
● Endpoint detection and response tools.
● Security information and event management (SIEM) tools.
● IDS, IPS.
● MITRE ATT&CK framework.
Logging
● Logs are records of events that occurred on your assets.
● Logging is the act of keeping a record of events that occurred.
● These records are commonly written to a log file or in some cases stored in a DB.
What assets should we be logging from?
Infrastructure dependent, but rule of thumb “Log from attack surfaces and possible POE”.
● Endpoints, servers.
● Applications.
● Network devices.
● Cloud infrastructure.
Logging (What can we log?)
● Audit logs(user activity - login, logout, content modification etc).
● Application logs.
● Security logs.
● Operating system logs.
Threat detection using logs
● You have to be logging important events. (In some cases you may need
enhanced logging)
● Ingest the logs into an analysis/security solution. EDR, SIEM.
● Create detection rules to detect various kinds of activity.
● Analyze the logs, and correlate them with other events.
● Generate alerts if malicious indicators are found.
Demo (Infrastructure overview)
Malicious file
sent to user
User opens
and clicks.
Connection established
back to the attacker
User endpoint +
Wazuh agent
Attacker
Logs
SIEM + XDR
Limitations of logging
● Misses events generated before the logging was started.
● Cannot see process activities. A process creation log might look benign, but the
process is executing malicious activities.
● Logs collected still have to be analyzed and correlated to trigger detection
rules. An opportunity here?
● Logging consumes disk space :-(.
● The activity has to happen before detection can start. You are one step behind.
● Logs can be faked, cleared, disabled.
Conclusion
● Logging is super useful, enable them on your assets if you can.
● Do not rely solely on logging. Analyse other sources of information, investigate
process, file modifications etc.
● Continuously tune your detection rules. Also do not rely mainly on your
detection rules as some may not trigger for new attack methods, or may just be
wrongly configured.
● Is there a possibility of analyzing user activities and predicting what the user
will do next? Any deviation from that can be considered abnormal. UEBA.

More Related Content

PDF
PPTX
E-governance Models
PPTX
27001.pptx
PPTX
Logging, monitoring and auditing
PPTX
Cours Audit et sécurité V3.pptx
PPT
isms-presentation.ppt
PPTX
ISO_ 27001:2022 Controls & Clauses.pptx
PDF
NIST cybersecurity framework
E-governance Models
27001.pptx
Logging, monitoring and auditing
Cours Audit et sécurité V3.pptx
isms-presentation.ppt
ISO_ 27001:2022 Controls & Clauses.pptx
NIST cybersecurity framework

Similar to Leveraging logging for threat detection.pptx (20)

PPTX
Anomalies Detection: Windows OS - Part 1
PPTX
Anomalies Detection: Windows OS - Part 1
PDF
Windows Threat Hunting
PPTX
Cryptography and system security
PPTX
Introduction to cyber security
PPTX
Cassandra Lunch #90: Securing Apache Cassandra
PDF
M1-02-HowCriminalsPlan.pdf
PPTX
Intrusion detection system IDS
PDF
Incident handling is a clearly defined set of procedures to manage and respon...
PDF
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
PPTX
Cyber warfare introduction
PDF
Ak03402100217
ODP
CISSP Week 14
PDF
HITB2013AMS Defenting the enterprise, a russian way!
 
PDF
Thick Client Penetration Testing.pdf
PDF
Securing the Internet from Cyber Criminals
PPTX
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
PDF
Introduction to Ethical Hacking pdf file
PDF
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
PPTX
FALCON.pptx
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
Windows Threat Hunting
Cryptography and system security
Introduction to cyber security
Cassandra Lunch #90: Securing Apache Cassandra
M1-02-HowCriminalsPlan.pdf
Intrusion detection system IDS
Incident handling is a clearly defined set of procedures to manage and respon...
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
Cyber warfare introduction
Ak03402100217
CISSP Week 14
HITB2013AMS Defenting the enterprise, a russian way!
 
Thick Client Penetration Testing.pdf
Securing the Internet from Cyber Criminals
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
Introduction to Ethical Hacking pdf file
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
FALCON.pptx
Ad

Recently uploaded (20)

PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Encapsulation theory and applications.pdf
PDF
August Patch Tuesday
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Tartificialntelligence_presentation.pptx
A novel scalable deep ensemble learning framework for big data classification...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Programs and apps: productivity, graphics, security and other tools
cloud_computing_Infrastucture_as_cloud_p
Encapsulation theory and applications.pdf
August Patch Tuesday
Zenith AI: Advanced Artificial Intelligence
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation_ Review paper, used for researhc scholars
A comparative analysis of optical character recognition models for extracting...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Chapter 5: Probability Theory and Statistics
OMC Textile Division Presentation 2021.pptx
WOOl fibre morphology and structure.pdf for textiles
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Tartificialntelligence_presentation.pptx
Ad

Leveraging logging for threat detection.pptx

  • 1. Leveraging logging for threat detection Chris Bassey
  • 2. Overview ● Cyber threats ● Cyber attacks ● Threat detection ● Logging ● Threat detection using logs ● Demo ● Limitations of logging ● Conclusion
  • 3. Cyber threats A cyber threat is the possibility that malicious activity from threat actors targeting your digital assets and infrastructure may occur. Threats may include the possibility of: ● Phishing. ● Malware infections. ● Data breaches, theft and damage. ● (Distributed) denial of service attacks.
  • 4. Cyber attacks Cyber attacks are malicious and unwanted activities from actors seeking to compromise the confidentiality, integrity and availability of digital assets and infrastructure. Examples include: ● Ongoing phishing and impersonation campaigns. ● Malware actively running on your endpoints. (Ransomware, RATs, infostealers) ● Ongoing (D)DoS attacks. ● Data exfiltration. ● Ransomware.
  • 5. Threat detection This is the process of identifying threats that are trying to attack your assets and infrastructure. It might be the detection of: ● Downloaded malware that has not yet been run. ● Running malware exfiltrating data. ● Running malware connecting back to a C2 server. ● A stager retrieving a second stage payload. ● An ongoing phishing campaign.
  • 6. Threat detection (Methodologies) ● Threat intelligence (early stage, pre-attack) ● Signature based detection ● Anomaly based detection ● Behavioural based detections (thin line between this and ML based detections) ● ML based detections (early days for this?).
  • 7. Threat detection (Tools) ● Endpoint detection and response tools. ● Security information and event management (SIEM) tools. ● IDS, IPS. ● MITRE ATT&CK framework.
  • 8. Logging ● Logs are records of events that occurred on your assets. ● Logging is the act of keeping a record of events that occurred. ● These records are commonly written to a log file or in some cases stored in a DB. What assets should we be logging from? Infrastructure dependent, but rule of thumb “Log from attack surfaces and possible POE”. ● Endpoints, servers. ● Applications. ● Network devices. ● Cloud infrastructure.
  • 9. Logging (What can we log?) ● Audit logs(user activity - login, logout, content modification etc). ● Application logs. ● Security logs. ● Operating system logs.
  • 10. Threat detection using logs ● You have to be logging important events. (In some cases you may need enhanced logging) ● Ingest the logs into an analysis/security solution. EDR, SIEM. ● Create detection rules to detect various kinds of activity. ● Analyze the logs, and correlate them with other events. ● Generate alerts if malicious indicators are found.
  • 11. Demo (Infrastructure overview) Malicious file sent to user User opens and clicks. Connection established back to the attacker User endpoint + Wazuh agent Attacker Logs SIEM + XDR
  • 12. Limitations of logging ● Misses events generated before the logging was started. ● Cannot see process activities. A process creation log might look benign, but the process is executing malicious activities. ● Logs collected still have to be analyzed and correlated to trigger detection rules. An opportunity here? ● Logging consumes disk space :-(. ● The activity has to happen before detection can start. You are one step behind. ● Logs can be faked, cleared, disabled.
  • 13. Conclusion ● Logging is super useful, enable them on your assets if you can. ● Do not rely solely on logging. Analyse other sources of information, investigate process, file modifications etc. ● Continuously tune your detection rules. Also do not rely mainly on your detection rules as some may not trigger for new attack methods, or may just be wrongly configured. ● Is there a possibility of analyzing user activities and predicting what the user will do next? Any deviation from that can be considered abnormal. UEBA.

Editor's Notes

  • #4: These threat actors may include nation states, criminal gangs, competitors, disgruntled employees, hacktivists or just kids mucking around.
  • #5: You can see the guy with the fancy graduation hat. He has graduated from being a threat to an attacker. A cyber threat becomes a cyber attack when it is executed. Key difference between threats and attacks is execution.
  • #9: Collectively, the record of events are called logs