Solved

Low-cost /freeware IOC tools

Posted on 2016-08-21
4
80 Views
Last Modified: 2016-09-03
Anyone has any suggestion for < US$3500 tools for Indicators of Compromise
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 41764798
I suppose you meant scavenging for IOC on system and network. The detection of IOC should be covered by those FW, NIPS, NGFW, UTM, Endpoint security etc. More so if you have a SIEMS that aggregate the logs from these device sources to detect the list of IOC that you are targeting. I supposed the IOC are the malware callbacks to Command/Control ip addresses, blacklisted domain, etc. See this framework

http://blog.sqrrl.com/a-framework-for-threat-hunting-part-1-the-pyramid-of-pain
In fact, Sqrrl has such solution  - http://sqrrl.com/product/sqrrl-enterprise/

I am also see service based such as Recordedfuture as possibility and they can supply IOC in term of Yara rules to your security device to detect and alter on sighting those IOC.

https://www.recordedfuture.com/internal-network-hunting/

But largely searching for IOC is no trivial task, as first off it can be either be a passive means like deploying a honeypot or even extending it to honeynet. See this

https://www.anomali.com/resources/modern-honey-net

Manual inhouse means to search IOC may be possible for a small setup via IOC Finder tool. See this

https://www.fireeye.com/blog/threat-research/2011/12/redline-openioc-build-effective-indicators.html

Otherwise the COTS for such Finder, you likely have to poll the sales support for candidates like Lightcyber for exploited behaviors or Sift Science for fraud related

http://lightcyber.com/why-lightcyber-even-if-i-have-edr/

https://siftscience.com/pricing
0
 
LVL 62

Expert Comment

by:gheist
ID: 41765670
You mean €€€ 3500 per month per year or for lifetime support?
0
 

Author Comment

by:sunhux
ID: 41766796
US$3500 purchase price;  yearly maintenance is separate.

I'm more concerned with Ransomware, phishing and data leakages.
OSSEC is one such tool
0
 
LVL 63

Assisted Solution

by:btan
btan earned 500 total points
ID: 41766826
I am thinking as a whole on two approach
a) Proactive - Setup Honeypot to generate the IOC for further discovery esp on evolved threats since signature and behavioral detection is not foolproof. Need to stop targeted attack and isolate fast to contain damage.

b) Early detection -  Beef up security baseline implemented at system/network/appl level, go beyond just IOC findings instead tap on the reinforced controls to alert you or OPS team instead. Tap on SIEMS to correlate rule to trigger on DLP, IRM, Anti-spam/phishing and Anti-Ransomware related to suspected events. This in a way also "discover" IOC.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question