
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Is there anyone who wrote a complex rules about botnet attack? if it happened may i know or see that rule?
Accepted Solutions

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
This question seems a bit broad.
To narrow it down, what type of attack are you expecting? Distributed Intrusion Attempts? DDOS? Water cooler attacks with Exploit Kits? or are you referring to having a bot zombie/agent within your enterprise... in which case you would be looking for CnC, Bot-tasks such as participation in DDOS, traffic hosting or referrals (DNS,WEB), and new services (DNS hosted by workstations, servers- web, irc...) or cpu related activites: bitcoin mining, hash breaking...?
The first, is going to depend on your perimeter and attack surface, the second will depend more on your host based security layers.
Mike

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
This question seems a bit broad.
To narrow it down, what type of attack are you expecting? Distributed Intrusion Attempts? DDOS? Water cooler attacks with Exploit Kits? or are you referring to having a bot zombie/agent within your enterprise... in which case you would be looking for CnC, Bot-tasks such as participation in DDOS, traffic hosting or referrals (DNS,WEB), and new services (DNS hosted by workstations, servers- web, irc...) or cpu related activites: bitcoin mining, hash breaking...?
The first, is going to depend on your perimeter and attack surface, the second will depend more on your host based security layers.
Mike

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hi Mike, I need your assistance regarding Use Case Creation. Could you please provide rules for the following.(I tried to be specific)
- Patch non compliance
- Unauthorized security configuration
- Unauthorized access of storage account
- Unauthorized access of storage account keys
- Virus, malware, malicious code detection(Correlation)
- Vulnerability detection
- Unauthorized devices in the network
- Unauthorized applications in the network
- Loss / tampering with logs especially security logs
- Spoofing
- DOS and DDOS attacks
- Unauthorized access to certificate private keys
- Suspicious privilege account activity
- Unauthorized firewall rule changes
- Unauthorized changes to express route connectivity
- Suspicious logins to VM
- Botnet detection at firewall