Intelligence-Driven Incident Response with YARA
نویسنده
چکیده
Given the current cyber threat landscape, organizations are now beginning to acknowledge the inexorable law that decrees that they will be compromised. Threat actors’ tactics, techniques, and procedures demand intelligence-driven incident response, which in turn, depend upon methodologies capable of yielding actionable threat intelligence in order to adapt to each threat. The process to develop such intelligence is already in motion, heavily relying on behavioral analysis, and has given birth to cyber threat indicators as a means of fingerprinting and thus identifying new and unknown threats. This paper will focus on YARA, a malware identification and classification tool used as a scan engine, whose features will be explored in order to deploy indicators at the endpoint. Intelligence-Driven Incident Response with YARA! 2 Ricardo Dias;[email protected] “It is even better to act quickly and err than to hesitate until the time of action is past.” Carl von Clausewitz: On War, 1832
منابع مشابه
Rethinking Security Incident Response: The Integration of Agile Principles
1 In today‟s globally networked environment, information security incidents can inflict staggering financial losses on organizations. Industry reports indicate that fundamental problems exist with the application of current linear plan-driven security incident response approaches being applied in many organizations. Researchers argue that traditional approaches value containment and eradication...
متن کاملMacrocognition in Day-To-Day Police Incident Response
Using examples of incidents that UK Police Forces deal with on a day-to-day basis, we explore the macrocognition of incident response. Central to our analysis is the idea that information relating to an incident is translated from negotiated to structured and actionable meaning, in terms of the Community of Practice of the personnel involved in incident response. Through participant observation...
متن کاملA Data-driven Method for Crowd Simulation using a Holonification Model
In this paper, we present a data-driven method for crowd simulation with holonification model. With this extra module, the accuracy of simulation will increase and it generates more realistic behaviors of agents. First, we show how to use the concept of holon in crowd simulation and how effective it is. For this reason, we use simple rules for holonification. Using real-world data, we model the...
متن کاملCollusion Set Detection Through Outlier Discovery
Digging in the details : a case study in network data mining p. 14 Efficient identification of overlapping communities p. 27 Event-driven document selection for terrorism information extraction p. 37 Link analysis tools for intelligence and counterterrorism p. 49 Mining candidate viruses as potential bio-terrorism weapons from biomedical literature p. 60 Private mining of association rules p. 7...
متن کاملDecaying Indicators of Compromise
The steady increase in the volume of indicators of compromise (IoC) as well as their volatile nature makes their processing challenging. Once compromised infrastructures are cleaned up, threat actors are moving to on to other target infrastructures or simply changing attack strategies. To ease the evaluation of IoCs as well as to harness the combined analysis capabilities, threat intelligence s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015