AlienVault Alarm Taxonomy
AlienVault Alarm Taxonomy
AlienVault Alarm Taxonomy
What are the new alarm categories in USM and OSSIM v4.3?
What
are
these
Intent
categories
based
on?
Were
using
a
simplified
version
of
an
industry
standard
for
understanding
how
cyber
attackers
conduct
attacks.
Published
in
2009,
Lockheed
Martins
Kill
Chain
methodology
is
one
of
the
best
ways
of
associating
a
specific
event
within
the
larger
context
of
an
attack.
Considered
in
the
context
of
network
intrusions,
the
kill
chain
describes
a
scenario
in
which
an
attacker
must
develop
a
payload
to
breach
a
trusted
boundary,
establish
a
presence
inside
a
trusted
environment,
and
take
actions
towards
the
attackers
objectiveswhether
these
objectives
consist
of
moving
laterally
inside
the
environment
or
violating
the
confidentiality,
integrity,
or
availability
of
a
system
in
the
environment.
How
do
you
know
what
an
attackers
intent
is?
This
can
be
surmised
based
on
attack
activity
and
how
theyre
interacting
with
a
network
and
its
assets.
AlienVault
Labs
applies
their
extensive
research
into
attacker
profiles,
tools,
and
techniques
to
evaluate
each
threat
to
determine
the
appropriate
category
for
each
alarm.
As
a
reference,
the
table
below
provides
some
very
high-level
information
regarding
the
attackers
goals
during
each
attack
stage
/
type
of
alarm.
Find target.
Reconnaissance
&
Probing
Develop
plan
of
attack
based
on
opportunities
for
exploit.
System Compromise
User
FAQ:
Alarm
Taxonomy
Page
2
of
5
Is
there
some
way
of
identifying
the
previous
naming
convention
for
the
alarm?
Yes.
Weve
retained
the
original
(pre-4.3)
naming
convention
and
you
can
view
that
in
italics
at
the
top
of
the
alarm
detail
window
for
each
alarm.
For
example,
you
can
see
the
pre-4.3
naming
convention
for
this
alarm
highlighted
in
the
blue
box
below:
Describe
the
quantity
of
alarm
content.
How
many
specific
alarms
are
there?
Each
alarm
is
triggered
by
an
event
correlation
rule.
So,
another
way
of
explaining
this
would
be
to
say
that
there
are
currently
1500+
event
correlation
rules
in
our
threat
intelligence
subscription.
However,
this
number
will
continue
to
increase
as
threats
evolve
and
emerge,
and
the
technological
ability
to
detect
them
evolves
as
well.
The
following
should
provide
some
highlights
with
respect
to
the
breadth
of
our
threat
intelligence
content:
instructions
are
written
by
our
AlienVault
Labs
team
members,
who
have
decades
of
CSIRT
and
DFIR
experience
responding
to
information
security
incidents
and
investigations.
Updates
to
this
information
are
included
in
our
threat
intelligence
subscription
content,
along
with
updates
to
our
event
correlation
rules,
IDS
signatures,
vulnerability
and
asset
inventory
databases,
and
more.
User
FAQ:
Alarm
Taxonomy
Page
5
of
5