SlideShare a Scribd company logo
1
ElasticON Security
Samir Bennacer
Principal Solutions Architect, EMEA Security Specialist
Automate Threat Detection
Agenda
Automated Threat Detection
Recapping the Data Dilemma
1
Elastic Prebuilt Protections
3
Detection Philosophy
4
An Open Detection Repo
5
The Detection Engine
2
5 1B 5
Data Domains
Practitioners analyze
hosts, cloud, network
devices, application
performance, user,
and more!
Events Per Day
Most organizations
average 1 billion
events per day
SOC Analysts
Security Operation
Centers vary in size,
but most have less
than 5 analysts
THE DATA DILEMMA
The Elastic Agent Of Course!
5
Get Data
Protect My Org
Agenda
Automated Threat Detection
Recapping the Data Dilemma
Using Elastic Prebuilt Protections
3
Detection Philosophy
4
An Open Detection Repo
5
The Detection Engine
1
2
Detection Engine
It’s as simple as search.
• Speed and scale of Elasticsearch to
detect known and unknown threats
• Easily automate threat detection
using queries (KQL/DSL, machine
learning, thresholds, and more!
• 200 free protections;
built in the open
8
DEMO #1
Detection Engine
Agenda
Automated Threat Detection
Recapping the Data Dilemma
Elastic Prebuilt Protections
3
Detection Philosophy
4
An Open Detection Repo
5
The Detection Engine
1
2
200 Free Rules. Built in the Open
attack.mitre.org
Prebuilt Protections
By Data Domain
55%
Windows, Linux, MacOS
MITRE ATT&CK™ Knowledge Base
attack.mitre.org
Prebuilt Protections
Threat Detection and SecOps
27%
Defense Evasion
14
DEMO #2
Rule Metadata
...but my data is special...
<random security professional>
16
DEMO #3
Rule Editing and Exceptions
17
Get Data
Protect My Org
Agenda
Automated Threat Detection
Data Dilemma
Elastic Prebuilt Protections
3
Detection Philosophy
4
An Open Detection Repo
5
The Detection Engine
1
2
Our Approach to Detection Engineering
github.com/elastic/detection-rules/.../PHILOSOPHY.md
● Shaped by our collective real-world experience
● Focus on behaviors more than custom tools
● Write logic independent from the data source
● Detect true positives while avoiding false positives
Behaviors vs Indicators
● Emphasize technique, not indicators
○ Forces you to write generic detections
○ Avoids the risk of overfitting
○ Similar philosophy to MITRE ATT&CK®
● Make exceptions where it makes sense
○ When a high-fidelity behavioral detection is nontrivial
https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf
github.com/elastic/detection-rules/.../PHILOSOPHY.md
Detect Behaviors, not the Tool
✖ Indicator ✔ Behavior
process.name:mimikatz.exe or
process.command_line:*sekurlsa*
event.module:sysmon and
event.code:10 and
winlog.event_data.TargetImage:
lsass.exe
github.com/elastic/detection-rules/.../PHILOSOPHY.md
Using Elastic Common Schema (ECS
github.com/elastic/ecs
● Defines a common set of field names and types
● Enumerates categorization fields and values to bin
similar events together
● Designed to be extensible and grow with our needs
● ECS is adopted throughout the Elastic Stack
Write Logic Independent of Data Sources
✖ Specific to each source ✔ With standard ECS field
src:10.42.42.42 or
client_ip:10.42.42.42 or
apache2.access.remote_ip:
10.42.42.42 or
context.user.ip:10.42.42.42
source.ip:10.42.42.42
github.com/elastic/detection-rules/.../PHILOSOPHY.md
Detect True Positives and avoid False Positives
● Create or Modify System Process: Windows Service
○ ATT&CK technique T1543 subtechnique 003
● System Services: Service Execution
○ ATT&CK technique T1569, subtechnique 002
github.com/elastic/detection-rules/.../PHILOSOPHY.md
✖ Too vague ✖ Too many false
positives
process.name:sc.exe process.name:sc.exe and
process.args:(create or config)
Detect True Positives and avoid False Positives
github.com/elastic/detection-rules/.../PHILOSOPHY.md
✖ Too easy to evade ✖ Too easy to evade
process.command_line:
"sc *create * binPath*"
process.name:sc.exe and
process.command_line:
"* create * binPath*"
Detect True Positives and avoid False Positives
github.com/elastic/detection-rules/.../PHILOSOPHY.md
✖ Too overfitted ✔ Good FP and TP
balance
process.name:sc.exe and
process.args:(create or config)
and process.parent.name:cmd.exe
process.name:sc.exe and
process.args:(create or config)
and (process.args:* or
not user.name:SYSTEM)
https://github.com/elastic/detection-rules/issues/47
Detect True Positives and avoid False Positives
github.com/elastic/detection-rules/.../PHILOSOPHY.md
✔ Good FP and TP
balance
process.name:sc.exe and
process.args:(create or config)
and (process.args:* or
not user.name:SYSTEM)
Use command line
arguments to infer
adversary intent
Lateral movement
Privilege escalation
Detect True Positives and avoid False Positives
github.com/elastic/detection-rules/.../PHILOSOPHY.md
Agenda
Automated Threat Detection
Data Dilemma
Elastic Prebuilt Protections
3
Detection Philosophy
4
An Open Detection Repo
5
The Detection Engine
1
2
A Public Repo! github.com/elastic/detection-rules
Community & Collaboration
• A dev-first mentality for
malicious behavior detection
The Rules
• A place to engage on rules for all
users of Elastic Security
Contribution Guides
• Creating issues, submitting PRs,
our philosophy, and more!
Developer Tools
• Interactive CLI to create rules
• Syntax validation, ECS schemas,
metadata checker, etc.
Try free on Cloud:
ela.st/security-trial
Take a quick spin:
demo.elastic.co
Connect on Slack:
ela.st/slack
Join the Elastic Security community
Thank You
Search. Observe. Protect.

More Related Content

PDF
Keynote: Elastic Security evolution and vision
PDF
Keynote: Elastic Security evolution and vision
PDF
Palestra de abertura: Evolução e visão do Elastic Security
PDF
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
PDF
Automatisez la détection des menaces et évitez les faux positifs
PDF
Opérez vos processus avec l'alerting, les tableaux de bord personnalisés et l...
PDF
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
PDF
Oscar Cabanillas - Elastic - OSL19
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and vision
Palestra de abertura: Evolução e visão do Elastic Security
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Automatisez la détection des menaces et évitez les faux positifs
Opérez vos processus avec l'alerting, les tableaux de bord personnalisés et l...
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Oscar Cabanillas - Elastic - OSL19

What's hot (20)

PDF
Automate threat detections and avoid false positives
PDF
Elastic SIEM (Endpoint Security)
PDF
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
PDF
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
PDF
Operacionalize com alerta, dashboards customizados e linhas do tempo
PDF
Conferencia principal: Evolución y visión de Elastic Security
PDF
Operationalize with alerting, custom dashboards, and timelines
PDF
Operar con alertas, dashboards customizados y cronología
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
PDF
October 2020 meetup
PDF
End-to-End Security Analytics with the Elastic Stack
PDF
What is the Future of SIEM?
PDF
Elastic Security: Your one-stop OODA loop shop
PDF
Get full visibility and find hidden security issues
PPTX
Getting Started with Azure Sentinel
PDF
Limitless xdr meetup
PDF
7 Experts on Implementing Azure Sentinel
PPTX
Journey to Azure Sentinel
PDF
Elastic Security Brochure
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
Automate threat detections and avoid false positives
Elastic SIEM (Endpoint Security)
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Operacionalize com alerta, dashboards customizados e linhas do tempo
Conferencia principal: Evolución y visión de Elastic Security
Operationalize with alerting, custom dashboards, and timelines
Operar con alertas, dashboards customizados y cronología
Elastic Security: Enterprise Protection Built on the Elastic Stack
October 2020 meetup
End-to-End Security Analytics with the Elastic Stack
What is the Future of SIEM?
Elastic Security: Your one-stop OODA loop shop
Get full visibility and find hidden security issues
Getting Started with Azure Sentinel
Limitless xdr meetup
7 Experts on Implementing Azure Sentinel
Journey to Azure Sentinel
Elastic Security Brochure
Elastic Security: Enterprise Protection Built on the Elastic Stack
Ad

Similar to Automate threat detections and avoid false positives (20)

PDF
Automatize a detecção de ameaças e evite falsos positivos
PDF
Automatiza las detecciones de amenazas y evita los falsos positivos
PDF
Automatiza las detecciones de amenazas y evita falsos positivos
PDF
Automatiza las detecciones de amenazas y evita falsos positivos
PPTX
c0c0n Elastic Security Workshop - 7.7 [Elastic SIEM].pptx
PDF
Elastic Security : Protéger son entreprise avec la Suite Elastic
PDF
ECS: Delivering Better Cyber Intelligence and Compliance
PDF
Empower your security practitioners with the Elastic Stack
PDF
The importance of normalizing your security data to ECS
PPTX
How Elastic Security Meets SOC Needs
PDF
SIEM, malware protection, deep data visibility — for free
PDF
Reinventing enterprise defense with the Elastic Stack
PDF
Advanced correlations for threat detection and more
PDF
Reinventing enterprise defense with the Elastic Stack
PDF
Breaking silos between DevOps and SecOps with Elastic
PDF
Elastic Security under the hood
PDF
Log Monitoring and Anomaly Detection at Scale at ORNL
PDF
BSides Lisbon - Data science, machine learning and cybersecurity
PDF
Scaling Security Threat Detection with Apache Spark and Databricks
PDF
Monitoring modern applications using Elastic
Automatize a detecção de ameaças e evite falsos positivos
Automatiza las detecciones de amenazas y evita los falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivos
Automatiza las detecciones de amenazas y evita falsos positivos
c0c0n Elastic Security Workshop - 7.7 [Elastic SIEM].pptx
Elastic Security : Protéger son entreprise avec la Suite Elastic
ECS: Delivering Better Cyber Intelligence and Compliance
Empower your security practitioners with the Elastic Stack
The importance of normalizing your security data to ECS
How Elastic Security Meets SOC Needs
SIEM, malware protection, deep data visibility — for free
Reinventing enterprise defense with the Elastic Stack
Advanced correlations for threat detection and more
Reinventing enterprise defense with the Elastic Stack
Breaking silos between DevOps and SecOps with Elastic
Elastic Security under the hood
Log Monitoring and Anomaly Detection at Scale at ORNL
BSides Lisbon - Data science, machine learning and cybersecurity
Scaling Security Threat Detection with Apache Spark and Databricks
Monitoring modern applications using Elastic
Ad

More from Elasticsearch (20)

PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
From MSP to MSSP using Elastic
PDF
Cómo crear excelentes experiencias de búsqueda en sitios web
PDF
Te damos la bienvenida a una nueva forma de realizar búsquedas
PDF
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Plongez au cœur de la recherche dans tous ses états.
PDF
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
Welcome to a new state of find
PDF
Building great website search experiences
PDF
Keynote: Harnessing the power of Elasticsearch for simplified search
PDF
Cómo transformar los datos en análisis con los que tomar decisiones
PDF
Explore relève les défis Big Data avec Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Transforming data into actionable insights
PDF
Opening Keynote: Why Elastic?
PDF
Empowering agencies using Elastic as a Service inside Government
PDF
The opportunities and challenges of data for public good
PDF
Enterprise search and unstructured data with CGI and Elastic
An introduction to Elasticsearch's advanced relevance ranking toolbox
From MSP to MSSP using Elastic
Cómo crear excelentes experiencias de búsqueda en sitios web
Te damos la bienvenida a una nueva forma de realizar búsquedas
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Comment transformer vos données en informations exploitables
Plongez au cœur de la recherche dans tous ses états.
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
An introduction to Elasticsearch's advanced relevance ranking toolbox
Welcome to a new state of find
Building great website search experiences
Keynote: Harnessing the power of Elasticsearch for simplified search
Cómo transformar los datos en análisis con los que tomar decisiones
Explore relève les défis Big Data avec Elastic Cloud
Comment transformer vos données en informations exploitables
Transforming data into actionable insights
Opening Keynote: Why Elastic?
Empowering agencies using Elastic as a Service inside Government
The opportunities and challenges of data for public good
Enterprise search and unstructured data with CGI and Elastic

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
PDF
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
NewMind AI Monthly Chronicles - July 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
cuic standard and advanced reporting.pdf

Automate threat detections and avoid false positives

  • 1. 1 ElasticON Security Samir Bennacer Principal Solutions Architect, EMEA Security Specialist Automate Threat Detection
  • 2. Agenda Automated Threat Detection Recapping the Data Dilemma 1 Elastic Prebuilt Protections 3 Detection Philosophy 4 An Open Detection Repo 5 The Detection Engine 2
  • 3. 5 1B 5 Data Domains Practitioners analyze hosts, cloud, network devices, application performance, user, and more! Events Per Day Most organizations average 1 billion events per day SOC Analysts Security Operation Centers vary in size, but most have less than 5 analysts THE DATA DILEMMA
  • 4. The Elastic Agent Of Course!
  • 6. Agenda Automated Threat Detection Recapping the Data Dilemma Using Elastic Prebuilt Protections 3 Detection Philosophy 4 An Open Detection Repo 5 The Detection Engine 1 2
  • 7. Detection Engine It’s as simple as search. • Speed and scale of Elasticsearch to detect known and unknown threats • Easily automate threat detection using queries (KQL/DSL, machine learning, thresholds, and more! • 200 free protections; built in the open
  • 9. Agenda Automated Threat Detection Recapping the Data Dilemma Elastic Prebuilt Protections 3 Detection Philosophy 4 An Open Detection Repo 5 The Detection Engine 1 2
  • 10. 200 Free Rules. Built in the Open attack.mitre.org
  • 11. Prebuilt Protections By Data Domain 55% Windows, Linux, MacOS
  • 12. MITRE ATT&CK™ Knowledge Base attack.mitre.org
  • 13. Prebuilt Protections Threat Detection and SecOps 27% Defense Evasion
  • 15. ...but my data is special... <random security professional>
  • 16. 16 DEMO #3 Rule Editing and Exceptions
  • 18. Agenda Automated Threat Detection Data Dilemma Elastic Prebuilt Protections 3 Detection Philosophy 4 An Open Detection Repo 5 The Detection Engine 1 2
  • 19. Our Approach to Detection Engineering github.com/elastic/detection-rules/.../PHILOSOPHY.md ● Shaped by our collective real-world experience ● Focus on behaviors more than custom tools ● Write logic independent from the data source ● Detect true positives while avoiding false positives
  • 20. Behaviors vs Indicators ● Emphasize technique, not indicators ○ Forces you to write generic detections ○ Avoids the risk of overfitting ○ Similar philosophy to MITRE ATT&CK® ● Make exceptions where it makes sense ○ When a high-fidelity behavioral detection is nontrivial https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf github.com/elastic/detection-rules/.../PHILOSOPHY.md
  • 21. Detect Behaviors, not the Tool ✖ Indicator ✔ Behavior process.name:mimikatz.exe or process.command_line:*sekurlsa* event.module:sysmon and event.code:10 and winlog.event_data.TargetImage: lsass.exe github.com/elastic/detection-rules/.../PHILOSOPHY.md
  • 22. Using Elastic Common Schema (ECS github.com/elastic/ecs ● Defines a common set of field names and types ● Enumerates categorization fields and values to bin similar events together ● Designed to be extensible and grow with our needs ● ECS is adopted throughout the Elastic Stack
  • 23. Write Logic Independent of Data Sources ✖ Specific to each source ✔ With standard ECS field src:10.42.42.42 or client_ip:10.42.42.42 or apache2.access.remote_ip: 10.42.42.42 or context.user.ip:10.42.42.42 source.ip:10.42.42.42 github.com/elastic/detection-rules/.../PHILOSOPHY.md
  • 24. Detect True Positives and avoid False Positives ● Create or Modify System Process: Windows Service ○ ATT&CK technique T1543 subtechnique 003 ● System Services: Service Execution ○ ATT&CK technique T1569, subtechnique 002 github.com/elastic/detection-rules/.../PHILOSOPHY.md
  • 25. ✖ Too vague ✖ Too many false positives process.name:sc.exe process.name:sc.exe and process.args:(create or config) Detect True Positives and avoid False Positives github.com/elastic/detection-rules/.../PHILOSOPHY.md
  • 26. ✖ Too easy to evade ✖ Too easy to evade process.command_line: "sc *create * binPath*" process.name:sc.exe and process.command_line: "* create * binPath*" Detect True Positives and avoid False Positives github.com/elastic/detection-rules/.../PHILOSOPHY.md
  • 27. ✖ Too overfitted ✔ Good FP and TP balance process.name:sc.exe and process.args:(create or config) and process.parent.name:cmd.exe process.name:sc.exe and process.args:(create or config) and (process.args:* or not user.name:SYSTEM) https://github.com/elastic/detection-rules/issues/47 Detect True Positives and avoid False Positives github.com/elastic/detection-rules/.../PHILOSOPHY.md
  • 28. ✔ Good FP and TP balance process.name:sc.exe and process.args:(create or config) and (process.args:* or not user.name:SYSTEM) Use command line arguments to infer adversary intent Lateral movement Privilege escalation Detect True Positives and avoid False Positives github.com/elastic/detection-rules/.../PHILOSOPHY.md
  • 29. Agenda Automated Threat Detection Data Dilemma Elastic Prebuilt Protections 3 Detection Philosophy 4 An Open Detection Repo 5 The Detection Engine 1 2
  • 30. A Public Repo! github.com/elastic/detection-rules Community & Collaboration • A dev-first mentality for malicious behavior detection The Rules • A place to engage on rules for all users of Elastic Security Contribution Guides • Creating issues, submitting PRs, our philosophy, and more! Developer Tools • Interactive CLI to create rules • Syntax validation, ECS schemas, metadata checker, etc.
  • 31. Try free on Cloud: ela.st/security-trial Take a quick spin: demo.elastic.co Connect on Slack: ela.st/slack Join the Elastic Security community