![Lead Image © Kurhan, 123RF.com Lead Image © Kurhan, 123RF.com](/var/ezflow_site/storage/images/archive/2015/27/detecting-intruders-with-suricata/123rf34693451_binoculars-searching-man_kurhan.png/112951-1-eng-US/123RF34693451_Binoculars-Searching-Man_Kurhan.png_medium.png)
Lead Image © Kurhan, 123RF.com
Detecting intruders with Suricata
Finder
In the past, network attackers were much like purse grabbers or "smash and grab" muggers: They would find something they wanted, grab the goods, and run. Today's Advance Persistent Threats (APT) are much more insidious and dangerous. Instead of smashing and grabbing, attackers can find a way to steal your identity and hang around for a long period of time (see the box titled "Dwell Time." To thwart this type of long-term attacker, you need a different, more methodical approach.
Dwell Time
Most organizations are already at the 80% threshold in regard to security. Getting to 90% and above requires hard work and smart allocation of resources. A custom framework is part of the solution. In addition, you need to be aware of the attacker lifecycle:
1. Initial attack: The attacker is able to gain access to the system.
2. Lateral movement: The attacker moves from one system to the next, usually by exploiting unsecured systems or trust relationships between systems.
3. Exfiltration: The attacker moves data from the internal network to a remote network.
The key to arresting the hacker lifecycle is to reduce the dwell time – the time between the initial attack and detection. One security professional I know told me that his daily goal is to reduce dwell time from 14 days to 3 days.
The concept of dwell time contradicts the philosophy embodied in many traditional security metrics. Many people still feel the most important thing is to focus on the number of vulnerabilities found and solved. However, a single attacker only needs one vulnerability to get in; the dwell time on the network is often a much better indicator of the severity of the attack and the insecurity of the network. The key to reducing dwell time and creating a truly resilient defense is deceptively simple: Protect the data where it resides. Focus on pathways
Buy this article as PDF
(incl. VAT)