DetectionStrategies
Understanding and Using the 4Types of ThreatDetection
Sergio Caltagirone and Robert M. Lee
Detection is themost
Important thingyoudo.
Develop and implement appropriate activities to identify the occurrence of a
cybersecurity event. NISTCybersecurityFrameworkv1.1
ASSUMEBREACH MEANS ALL ELSE FAILS.
NIST
CYBERSECURITY
FRAMEWORK
IDENTIFY
PROTECT
DETECTRESPOND
RECOVER
Detection Strategies
How &Where
Howyoudetectmattersas muchas whereyou
detect. Deploying“networkdetection”and“host
detection”isnota completedetectionstrategy. Nor
doall resourcesrequirethesamedetection!
Detection Costs
Falsenegativesandfalsepositivesbothleadtolossof
control! ASOC inundatedwithlow-qualityalertsis
thesame as aSOC lacking alerts. HowandWhere
determineyourdetectionquality.
Detection is Multi-Use
Securityoperationsismorethanrapidresponseand
incorporateshunting,investigation,andeachuse
caserequiresdifferentdetectionstrategies.
A detection strategy matches the appropriate detection approach to risks, resources, and use-case ensuring full detective
coverage while minimizingcost.
A Detection Strategy - How
Asset Event Location Use-Case Detection
Human-MachineInterface
(HMI)
NewFiles Host NovelAttack Behavioral
OPCServer Enumeration Network SimilarAttack ScanningModels(Anomaly)
VPNConcentrator VPN-to-Known-C2 Network Scoping Indicator
01 IdentifyAssets,Events,Location,andUse-CasewithDetectionApproach–Each linebecomesa
“DetectionTarget”
A Detection Strategy
Recon Delivery Exploitation Action on Objectives
P4 VPN.ID VPN.PWD_REUSE VPN.CONFIG_CHG
P3 EW.ID EW.SMB EW.NEW_ACCT
P2 HMI.ID HMI.NEW_FILES HMI.CHANGE_VAL
P1/0 PLC.ID PLC.CHANGE_VAL
* For Some Definition of the Purdue Model and Kill Chain
02 GenerateDetectionMaptoTestandMeasureCoverage–forICS,placeeach detectiontargetonthemap using
thePurdueModel &KillChain
4 Detection Types
Configuration-Based Detection
Configuration-based detection identifies deviations from aknown architecture.
Example: Two fielddevices(e.g.,PLCs)communicatingwitheachother,counterarchitectureanddesignexpectations
Benefits:
• Withperfectvisibilityandcoverage,itcan hypotheticallydetectallmaliciousactivity
• Accessible forindividualswithawiderangeofexperience
• Easytomaintainin staticenvironments
• Addssignificantvaluetootherdetectiontypesin responsesituations
Challenges:
• Difficulttomaintainindynamicenvironments
• Limitedvisibilityandcoveragereduce effectiveness
• Assumesa knowledgeofinfrastructureandconfiguration
• False-positiveproneduetolikelyconfigurationchanges
Modeling-Based Detection
Modeling-baseddetection uses mathematical models to classify assets andactivity
identifying elements inconsistent with the model.
Example: AbnormalnumberofWriterequestsinModbusTCPoutsideofnormalgiventhe
averageoverthelast30days
Benefits:
• Canidentifynoveladversaryactivity
• Easiertomaintainin verystaticenvironments
• Addssignificantvaluetootherdetectiontypesin responsesituations
Challenges:
• Difficulttomaintainwhenenvironmentschange
• Limitedvisibilityandcoveragereducestheeffectiveness
• Nocontextofthreatactivitytosupportinvestigations
• Assumesanalystshavein-depthknowledgeofinfrastructureandconfiguration
• False-positiveprone duetolikelyconfigurationchanges
• Potentiallyincorporatesexistingmaliciousactivityintothemodel
Indicator-Based Detection
Indicator-based detection searches for elements of information known about
previously andare often seen in the form of Indicators of Compromise (IOCs).
Example: A specificIPaddressthatisaccessinganinternalasset
Benefits:
• Thequickestformofdetectiontocreateand deploy
• Containsspecificthreatcontextrelatedtotheindicator
• Usefulforenrichingotherdatasourcesandthreatdetections
• Highlyeffectiveforscopinganenvironmentpostobservationoftheindicator
Challenges:
• Thevalueishighlydependentontheadversary’srateofchange
• Retroactivein naturegiventheneedtoobservetheindicatorfirst
• Doesnotscalewellbetweenvictims
• Upperlimitsastohowmanyindicatorscanbe processed
• Unknownindicatorexpiryleadstoinaccuratedetection
Threat Behavior-Based Detection
Threat behavior analytics examine activity in environments and compares single actions and aggregate actions against aset of known
malicious or suspicious activities.
Example: LegitimateVPN accessfollowedbyuseraccount creationandfiledownloadon
anengineeringworkstationandfinallyloginfromtheworkstationtoanHMI
Benefits:
• Excellent durabilityagainstadversarychange
• Easytotuneforeachorganizationandenvironment
• Lowfalsepositiverates
• Immediatetransparencyforanalyststodiagnosethealertagainstexpectedbehavior
• Onlyrequiresa fewanalyticstodetectmostknownmaliciousbehaviorusedsomewhere
inan intrusion
• Integrateswellwithdefensiveplaybooksandautomatedinvestigation/remediation
Challenges:
• Moderatelydifficulttoimplement
• Manyanalyticsrequiredtoprovidecompletecoverage
• Onlydetectssimilarthreatbehavioratthelimitofanalyticimagination
• Are notfullyreusableacrossallindustries
Analytic Properties
Comparing Detection Approaches
Threat Detection Applications
Comparing Detection Approaches to Applications
Detection Strategy Use-Case
IT Land
SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
CONTROLLER CONTROLLER CONTROLLER CONTROLLER
Detection Strategy Use-Case
VPN ENGINEERING WORKSTATION
NEW FILE (S)
SCANSSTARTED
IT Land
SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
Detection Strategy Use-Case
VPN ENGINEERING WORKSTATION
NEW FILE (S)
SCANSSTARTED
CONTROLLER CONTROLLER CONTROLLER CONTROLLER
OPC SERVER
OPC SCAN
ENUMERATION
IT Land
SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
Detection Strategy Use-Case
VPN ENGINEERING WORKSTATION
NEW FILE (S)
SCANSSTARTED
CONTROLLER CONTROLLER CONTROLLER CONTROLLER
OPC SERVER
OPC SCAN
ENUMERATION
OPC VALUE
OVERWRITE
IT Land
SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
CONTROLLER VALUE
OVERWRITE
Detection Strategy Use-Case
VPN ENGINEERING WORKSTATION
NEW FILE (S)
SCANSSTARTED
CONTROLLER CONTROLLER CONTROLLER CONTROLLER
OPC SERVER
OPC SCAN
ENUMERATION
OPC VALUE
OVERWRITE
IT Land
SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
Detection Strategy with the 4 Types of Detection
Develop a detection strategy!
• Utilizeall detection methods
• Support all youruse cases
• Detection is multi-use
• Consider How, Why, Where
How do yougeneratea detection strategy?
1. Develop “detection targets”
2. Createyour analytics map
3. Implement using costs & benefits ofeach type
4. Test &measure coverage
Thank you
info@dragos.com

More Related Content

PPSX
Next-Gen security operation center
PPTX
Threat hunting - Every day is hunting season
PPTX
SOC: Use cases and are we asking the right questions?
PDF
Threat Hunting
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PPTX
Incident response
PPTX
Cyber Threat Hunting with Phirelight
PDF
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Next-Gen security operation center
Threat hunting - Every day is hunting season
SOC: Use cases and are we asking the right questions?
Threat Hunting
Threat Hunting - Moving from the ad hoc to the formal
Incident response
Cyber Threat Hunting with Phirelight
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo

What's hot (20)

PDF
Threat Hunting with Splunk Hands-on
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
Red Team Framework
PPTX
Sqrrl and IBM: Threat Hunting for QRadar Users
PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
Introduction to QRadar
PDF
Endpoint Detection & Response - FireEye
PDF
Soc and siem and threat hunting
PPTX
SIEM Primer:
PDF
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
PDF
Threat Hunting Procedures and Measurement Matrice
PDF
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
Global Cyber Threat Intelligence
PDF
Threat hunting 101 by Sandeep Singh
PDF
Rothke secure360 building a security operations center (soc)
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PPTX
QRadar, ArcSight and Splunk
Threat Hunting with Splunk Hands-on
From SIEM to SOC: Crossing the Cybersecurity Chasm
Effective Threat Hunting with Tactical Threat Intelligence
Security operations center-SOC Presentation-مرکز عملیات امنیت
Red Team Framework
Sqrrl and IBM: Threat Hunting for QRadar Users
Security Operations Center (SOC) Essentials for the SME
Introduction to QRadar
Endpoint Detection & Response - FireEye
Soc and siem and threat hunting
SIEM Primer:
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Threat Hunting Procedures and Measurement Matrice
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
Effective Security Operation Center - present by Reza Adineh
Global Cyber Threat Intelligence
Threat hunting 101 by Sandeep Singh
Rothke secure360 building a security operations center (soc)
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
QRadar, ArcSight and Splunk
Ad

Similar to The Four Types of Threat Detection and Use Cases in Industrial Security (20)

PPTX
How to Build and Validate Ransomware Attack Detections (Secure360)
PPTX
RMS Security Breakfast
PDF
Doten apt presentaiton (2)
PPTX
Your cyber security webinar
PDF
Full_Cybersecurity_Project_Report_30_Pages.pdf
PDF
Full_Cybersecurity_Project_Report_30_Pages.pdf
PPTX
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
PPTX
What is Threat Hunting? - Panda Security
PPTX
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
PPTX
Your cyber security webinar
PDF
NCC Group Pro-active Breach Discovery: Network Threat Assessment
PDF
Incident Response & Malware Analysis Protecting the Digital Frontier
PDF
Why Penetration Testing is Important- digitdefence
PDF
Penetration Testing: An Essential Guide to Cybersecurity
PDF
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
PDF
What Every Developer And Tester Should Know About Software Security
PDF
Cyber Threat Hunting Workshop.pdf
PDF
Cyber Threat Hunting Workshop.pdf
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
PDF
Understanding the Basics of Penetration Testing Services.pdf
How to Build and Validate Ransomware Attack Detections (Secure360)
RMS Security Breakfast
Doten apt presentaiton (2)
Your cyber security webinar
Full_Cybersecurity_Project_Report_30_Pages.pdf
Full_Cybersecurity_Project_Report_30_Pages.pdf
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
What is Threat Hunting? - Panda Security
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
Your cyber security webinar
NCC Group Pro-active Breach Discovery: Network Threat Assessment
Incident Response & Malware Analysis Protecting the Digital Frontier
Why Penetration Testing is Important- digitdefence
Penetration Testing: An Essential Guide to Cybersecurity
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
What Every Developer And Tester Should Know About Software Security
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
Understanding the Basics of Penetration Testing Services.pdf
Ad

More from Dragos, Inc. (20)

PPTX
How to Increase ICS Cybersecurity Return on Investment (ROI)
PPTX
Dragos 2019 ICS Year in Review
PDF
Dragos and CyberWire: ICS Ransomware
PPTX
Dragos S4x20: How to Build an OT Security Operations Center
PPTX
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
PDF
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
PPTX
Solving ICS Cybersecurity Challenges in the Electric Industry
PPTX
Purple Teaming ICS Networks
PPTX
Securing Electric Utility Infrastructure
PDF
Rising Cyber Escalation US Iran Russia ICS Threats and Response
PPTX
Neighborhood Keeper - Introduction
PPTX
Dressing up the ICS Kill Chain
PDF
Consequence Informed Cyber Security
PPTX
Dragos year in review (yir) 2018
PPTX
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
PPTX
2018 Year in Review- ICS Threat Activity Groups
PDF
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
PDF
The Current ICS Threat Landscape
PDF
Industrial Control Systems Cybersecurity Technology Selection
PPTX
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
How to Increase ICS Cybersecurity Return on Investment (ROI)
Dragos 2019 ICS Year in Review
Dragos and CyberWire: ICS Ransomware
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Solving ICS Cybersecurity Challenges in the Electric Industry
Purple Teaming ICS Networks
Securing Electric Utility Infrastructure
Rising Cyber Escalation US Iran Russia ICS Threats and Response
Neighborhood Keeper - Introduction
Dressing up the ICS Kill Chain
Consequence Informed Cyber Security
Dragos year in review (yir) 2018
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
2018 Year in Review- ICS Threat Activity Groups
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
The Current ICS Threat Landscape
Industrial Control Systems Cybersecurity Technology Selection
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Modernising the Digital Integration Hub
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Five Habits of High-Impact Board Members
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
August Patch Tuesday
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
Geologic Time for studying geology for geologist
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
WOOl fibre morphology and structure.pdf for textiles
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Modernising the Digital Integration Hub
Zenith AI: Advanced Artificial Intelligence
Five Habits of High-Impact Board Members
Getting Started with Data Integration: FME Form 101
Final SEM Unit 1 for mit wpu at pune .pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Architecture types and enterprise applications.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Getting started with AI Agents and Multi-Agent Systems
CloudStack 4.21: First Look Webinar slides
observCloud-Native Containerability and monitoring.pptx
1 - Historical Antecedents, Social Consideration.pdf
STKI Israel Market Study 2025 version august
A comparative study of natural language inference in Swahili using monolingua...
August Patch Tuesday
Taming the Chaos: How to Turn Unstructured Data into Decisions
Geologic Time for studying geology for geologist
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
WOOl fibre morphology and structure.pdf for textiles

The Four Types of Threat Detection and Use Cases in Industrial Security

  • 1. DetectionStrategies Understanding and Using the 4Types of ThreatDetection Sergio Caltagirone and Robert M. Lee
  • 2. Detection is themost Important thingyoudo. Develop and implement appropriate activities to identify the occurrence of a cybersecurity event. NISTCybersecurityFrameworkv1.1 ASSUMEBREACH MEANS ALL ELSE FAILS. NIST CYBERSECURITY FRAMEWORK IDENTIFY PROTECT DETECTRESPOND RECOVER
  • 3. Detection Strategies How &Where Howyoudetectmattersas muchas whereyou detect. Deploying“networkdetection”and“host detection”isnota completedetectionstrategy. Nor doall resourcesrequirethesamedetection! Detection Costs Falsenegativesandfalsepositivesbothleadtolossof control! ASOC inundatedwithlow-qualityalertsis thesame as aSOC lacking alerts. HowandWhere determineyourdetectionquality. Detection is Multi-Use Securityoperationsismorethanrapidresponseand incorporateshunting,investigation,andeachuse caserequiresdifferentdetectionstrategies. A detection strategy matches the appropriate detection approach to risks, resources, and use-case ensuring full detective coverage while minimizingcost.
  • 4. A Detection Strategy - How Asset Event Location Use-Case Detection Human-MachineInterface (HMI) NewFiles Host NovelAttack Behavioral OPCServer Enumeration Network SimilarAttack ScanningModels(Anomaly) VPNConcentrator VPN-to-Known-C2 Network Scoping Indicator 01 IdentifyAssets,Events,Location,andUse-CasewithDetectionApproach–Each linebecomesa “DetectionTarget”
  • 5. A Detection Strategy Recon Delivery Exploitation Action on Objectives P4 VPN.ID VPN.PWD_REUSE VPN.CONFIG_CHG P3 EW.ID EW.SMB EW.NEW_ACCT P2 HMI.ID HMI.NEW_FILES HMI.CHANGE_VAL P1/0 PLC.ID PLC.CHANGE_VAL * For Some Definition of the Purdue Model and Kill Chain 02 GenerateDetectionMaptoTestandMeasureCoverage–forICS,placeeach detectiontargetonthemap using thePurdueModel &KillChain
  • 7. Configuration-Based Detection Configuration-based detection identifies deviations from aknown architecture. Example: Two fielddevices(e.g.,PLCs)communicatingwitheachother,counterarchitectureanddesignexpectations Benefits: • Withperfectvisibilityandcoverage,itcan hypotheticallydetectallmaliciousactivity • Accessible forindividualswithawiderangeofexperience • Easytomaintainin staticenvironments • Addssignificantvaluetootherdetectiontypesin responsesituations Challenges: • Difficulttomaintainindynamicenvironments • Limitedvisibilityandcoveragereduce effectiveness • Assumesa knowledgeofinfrastructureandconfiguration • False-positiveproneduetolikelyconfigurationchanges
  • 8. Modeling-Based Detection Modeling-baseddetection uses mathematical models to classify assets andactivity identifying elements inconsistent with the model. Example: AbnormalnumberofWriterequestsinModbusTCPoutsideofnormalgiventhe averageoverthelast30days Benefits: • Canidentifynoveladversaryactivity • Easiertomaintainin verystaticenvironments • Addssignificantvaluetootherdetectiontypesin responsesituations Challenges: • Difficulttomaintainwhenenvironmentschange • Limitedvisibilityandcoveragereducestheeffectiveness • Nocontextofthreatactivitytosupportinvestigations • Assumesanalystshavein-depthknowledgeofinfrastructureandconfiguration • False-positiveprone duetolikelyconfigurationchanges • Potentiallyincorporatesexistingmaliciousactivityintothemodel
  • 9. Indicator-Based Detection Indicator-based detection searches for elements of information known about previously andare often seen in the form of Indicators of Compromise (IOCs). Example: A specificIPaddressthatisaccessinganinternalasset Benefits: • Thequickestformofdetectiontocreateand deploy • Containsspecificthreatcontextrelatedtotheindicator • Usefulforenrichingotherdatasourcesandthreatdetections • Highlyeffectiveforscopinganenvironmentpostobservationoftheindicator Challenges: • Thevalueishighlydependentontheadversary’srateofchange • Retroactivein naturegiventheneedtoobservetheindicatorfirst • Doesnotscalewellbetweenvictims • Upperlimitsastohowmanyindicatorscanbe processed • Unknownindicatorexpiryleadstoinaccuratedetection
  • 10. Threat Behavior-Based Detection Threat behavior analytics examine activity in environments and compares single actions and aggregate actions against aset of known malicious or suspicious activities. Example: LegitimateVPN accessfollowedbyuseraccount creationandfiledownloadon anengineeringworkstationandfinallyloginfromtheworkstationtoanHMI Benefits: • Excellent durabilityagainstadversarychange • Easytotuneforeachorganizationandenvironment • Lowfalsepositiverates • Immediatetransparencyforanalyststodiagnosethealertagainstexpectedbehavior • Onlyrequiresa fewanalyticstodetectmostknownmaliciousbehaviorusedsomewhere inan intrusion • Integrateswellwithdefensiveplaybooksandautomatedinvestigation/remediation Challenges: • Moderatelydifficulttoimplement • Manyanalyticsrequiredtoprovidecompletecoverage • Onlydetectssimilarthreatbehavioratthelimitofanalyticimagination • Are notfullyreusableacrossallindustries
  • 15. Detection Strategy Use-Case IT Land SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
  • 16. CONTROLLER CONTROLLER CONTROLLER CONTROLLER Detection Strategy Use-Case VPN ENGINEERING WORKSTATION NEW FILE (S) SCANSSTARTED IT Land SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
  • 17. Detection Strategy Use-Case VPN ENGINEERING WORKSTATION NEW FILE (S) SCANSSTARTED CONTROLLER CONTROLLER CONTROLLER CONTROLLER OPC SERVER OPC SCAN ENUMERATION IT Land SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
  • 18. Detection Strategy Use-Case VPN ENGINEERING WORKSTATION NEW FILE (S) SCANSSTARTED CONTROLLER CONTROLLER CONTROLLER CONTROLLER OPC SERVER OPC SCAN ENUMERATION OPC VALUE OVERWRITE IT Land SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
  • 19. CONTROLLER VALUE OVERWRITE Detection Strategy Use-Case VPN ENGINEERING WORKSTATION NEW FILE (S) SCANSSTARTED CONTROLLER CONTROLLER CONTROLLER CONTROLLER OPC SERVER OPC SCAN ENUMERATION OPC VALUE OVERWRITE IT Land SPEARPHISHINGEMAIL KEY LOGGER & RAT ENGINEER CREDENTIALTHEFT
  • 20. Detection Strategy with the 4 Types of Detection Develop a detection strategy! • Utilizeall detection methods • Support all youruse cases • Detection is multi-use • Consider How, Why, Where How do yougeneratea detection strategy? 1. Develop “detection targets” 2. Createyour analytics map 3. Implement using costs & benefits ofeach type 4. Test &measure coverage