• Activities
    • Health
    • Education
    • Mobile
    • Sports
    • PSL
  • Economy
    • Auto Industry
    • Crypto Currency
    • Economy
    • Smart Devices
  • Tech
    • Startups
    • Social
    • Telecom
    • Technology
  • TechX World
+92 323 8324975
Sunday, March 26, 2023
TechX Pakistan | Startups | FinTech | Crypto | EdTech | Reviews
Advertisement
  • Home
  • News
  • Premium Content
  • How To
  • Advertisement
  • Contact
  • About
No Result
View All Result
  • Home
  • News
  • Premium Content
  • How To
  • Advertisement
  • Contact
  • About
No Result
View All Result
TechX Pakistan | Startups | FinTech | Crypto | EdTech | Reviews
No Result
View All Result
  • Home
  • News
  • Premium Content
  • How To
  • Advertisement
  • Contact
  • About
Home How To

How To prioritize threat detection approaches based on behavior V/S IOC

Bilquees Anwar by Bilquees Anwar
December 15, 2022
in How To
Reading Time: 3 mins read
A A
Buy author a coffee
How To prioritize threat detection approaches based on behavior V/S IOC

A core cyber security procedure typically includes the execution of detection rules based on Indicators of Compromise (IOCs). The most recent trend, however, is centered on the behavior-based detection approach. Let’s see how the two approaches differ and whether it makes sense to prioritize one over the other.

David Bianco created the “Pyramid of Pain,” a diagram that depicts the relationship between various indicators of attack and how much pain the adversary will suffer if these indicators are denied.

The lower part of the pyramid is made up of hash values, IP addresses, and domain names, also known as IOCs, which cause less pain to attackers if discovered.

How To prioritize threat detection approaches based on behavior V/S IOC

According to another researcher, Sam Curry, they may deliberately bomb security systems with insignificant IOCs so that victims miss the actual vector of attack.

having said that, David Bianco and Sam Curry agree that Tactics, Techniques, and Procedures (TTPs) are more advanced components of the attack vector that adversaries do not want to lose.

So, if a security operations centre (SOC) can identify both IOCs and Indicators of Behavior (IOBs), the likelihood of intrusion is reduced.

Hunting: Proactive vs. Reactive

There are numerous approaches that can be used to perform successful threat hunting. The two most common types of hunting are reactive and proactive hunting.

Intel-based hunting is a more reactive model, with data from intelligence-sharing platforms serving as the foundation for further investigation.

The detection rules are built using input from the Pyramid of Pain’s lower level, which includes IOCs such as domain names, hashes, IP addresses, and network or host artefacts.

As a result, these rules can hunt after such indicators have been detected and processed by threat intelligence sources. In other words, a similar attack happened in the past and now hunters are chasing the likewise triggers.

The proactive approach, on the other hand, is founded on hypotheses. In this case, the input data consists of Indicators of Attack (IoA), Indicators of Behavior (IOBs), and TTPs.

A hypothesis based on user and/or entity behaviour allows checking to see if the attack is happening right now and is intended to be as close to real-time as possible.

Organizations attempting to implement this strategy are frequently looking for cybersecurity vendors who can assist them in proactively identifying the most recent threats.

For example, SOC Prime’s Detection as Code platform offers a plethora of cutting-edge behavior-based detections that are ideal for a proactive approach to cybersecurity.

To read our blog on “Lahore may outlaw vehicles and bicycles on MM Alam Road,” click here.

Share54Tweet34Share9Send
Bilquees Anwar

Bilquees Anwar

Related Posts

How-to-use-smartboard-in-a-classroom-to-make-it-playful
How To

How to use Smartboard in a classroom to make it playful

by Huma Gull
March 16, 2023
how-to-use-ChatGPT-with-ease-in-an-effective-way
Technology

How to use ChatGPT with ease in an effective way

by Huma Gull
March 16, 2023
MS-Word-page-numbering;-How-to-do-it
How To

MS Word page numbering; How to do it

by Huma Gull
March 16, 2023
how-pakistan-can-avoid-the-risk-of-being-default
How To

How Pakistan can avoid the risk of being default

by Asad Hassan
March 2, 2023
how-to-know-twitters-new-checkmarks-and-labels
How To

How To know Twitter’s new checkmarks and labels

by Muhammad Kamal
January 17, 2023

Follow Us

Promoted

upcoming-phones-releases-which-ones-are-worth-waiting-for

Upcoming phones releases: Which ones are worth waiting for?

by Asad Hassan
March 21, 2023
0

Even if 2022 was a fantastic year to release excellent smartphones, 2023 is no less than 2022! In reality, everyone...

hostingwalay-participating-in-cxo-global-summit-expo-in-islamabad

HostingWalay participating in CXO Global Summit in Islamabad

by Asad Hassan
January 18, 2023
0

Everyday living involves the use of technology, and our Pakistani IT entrepreneurs are using their expertise to make their communities...

Gitex makes its debut in Africa, holding its first exhibition in Morocco in May 2023

Gitex makes its debut in Africa, holding its first exhibition

by Bilquees Anwar
November 28, 2022
0

Gitex, Dubai's premier technology exhibition, said on Tuesday that it was expanding into Africa. The first Gitex Africa will be...

Welcome to GITEX GLOBAL

Are you ready for the biggest tech event? GITEX Global

by Bilquees Anwar
September 2, 2022
0

As the year started with the global tech rout, ongoing inflationary concerns, and the recent rebound, yet the tech industry...

Recent News

Mohali Stadium may not host ICC ODI World Cup 2023

Mohali Stadium may not host ICC ODI World Cup 2023

March 26, 2023
Punjab has finally announced Ramadan hours for all offices

Punjab has finally announced Ramadan hours for all offices

March 26, 2023
What impact will rising prices have on Ramadan celebs?

Impact will rising prices have on Ramadan celebs

March 26, 2023
IBA warns against removing boxing from Olympics

Boxing Assoc. warns against removing it from Olympics

March 25, 2023
Senate requested Radio Pakistan to clear outstanding debts

Senate requested Radio Pakistan to clear outstanding debts

March 25, 2023
leak-of-chatgpt-conversation-history-confirmed-by-openai

Leak of ChatGPT conversation histories confirmed by OpenAI

March 25, 2023
Currently Playing

Presence of Pakistan, Connexion Lounge sponsored by @MinistryofITTelecomPakistan @GitexTechWeek

Presence of Pakistan, Connexion Lounge sponsored by @MinistryofITTelecomPakistan @GitexTechWeek

00:01:40

#ITCN Asia ’22 | 21st International IT and Telecom Show | Curtains Opened | TechX Pakistan

00:05:28

London Tech Week 2022 Highlights | #Pakistan #Software

00:02:58

#Zindigi Future Fest ’22 Curtains Opened | Day 01 Glimpses | Tour | TechX Pakistan

00:03:13

Wait is Over, ITCN Asia Pakistan Tech Fest 2022 is live now!

00:01:44

CXO Meetup Dubai by Tech Destination Pakistan - P@SHA x PSEX x MoITT

00:02:41

Workshop on IT Investment Opportunities by Tech Destination Pakistan

00:00:56

Pakistan Pavilion at GITEX Dubai 2021

00:01:39

#GITEX 2021 Curtains Opened | Day 01 Glimpses | 5G | Technology | Tour | TechX Pakistan

00:01:33

GITEX Technology Week 2020 by TechX Pakistan - Official Media Partner

00:01:27
TechX Pakistan | Startups | FinTech | Crypto | EdTech | Reviews

In 2019, Mohammad Owais took the initiative of launching the TechX Pakistan. It is a blog project by assessing the gap in Local Technology & Social blogging. It has one simple goal of creating awareness about latest technological development in the world and especially in Pakistan. We break news, cover interviews, seminars and exhibitions locally and internationally both, related to IT Startups, IT best practices, Businesses, Automobiles, Smartphone Technology and Social Media.

© 2019 - 2023 TechX.PK - All Rights Reserved

No Result
View All Result
  • Home
  • News
  • Premium Content
  • How To
  • Advertisement
  • Contact
  • About

© 2019 - 2023 TechX.PK - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version