Solved

Low-cost /freeware IOC tools

Posted on 2016-08-21
4
90 Views
Last Modified: 2016-09-03
Anyone has any suggestion for < US$3500 tools for Indicators of Compromise
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 41764798
I suppose you meant scavenging for IOC on system and network. The detection of IOC should be covered by those FW, NIPS, NGFW, UTM, Endpoint security etc. More so if you have a SIEMS that aggregate the logs from these device sources to detect the list of IOC that you are targeting. I supposed the IOC are the malware callbacks to Command/Control ip addresses, blacklisted domain, etc. See this framework

http://blog.sqrrl.com/a-framework-for-threat-hunting-part-1-the-pyramid-of-pain
In fact, Sqrrl has such solution  - http://sqrrl.com/product/sqrrl-enterprise/

I am also see service based such as Recordedfuture as possibility and they can supply IOC in term of Yara rules to your security device to detect and alter on sighting those IOC.

https://www.recordedfuture.com/internal-network-hunting/

But largely searching for IOC is no trivial task, as first off it can be either be a passive means like deploying a honeypot or even extending it to honeynet. See this

https://www.anomali.com/resources/modern-honey-net

Manual inhouse means to search IOC may be possible for a small setup via IOC Finder tool. See this

https://www.fireeye.com/blog/threat-research/2011/12/redline-openioc-build-effective-indicators.html

Otherwise the COTS for such Finder, you likely have to poll the sales support for candidates like Lightcyber for exploited behaviors or Sift Science for fraud related

http://lightcyber.com/why-lightcyber-even-if-i-have-edr/

https://siftscience.com/pricing
0
 
LVL 62

Expert Comment

by:gheist
ID: 41765670
You mean €€€ 3500 per month per year or for lifetime support?
0
 

Author Comment

by:sunhux
ID: 41766796
US$3500 purchase price;  yearly maintenance is separate.

I'm more concerned with Ransomware, phishing and data leakages.
OSSEC is one such tool
0
 
LVL 64

Assisted Solution

by:btan
btan earned 500 total points
ID: 41766826
I am thinking as a whole on two approach
a) Proactive - Setup Honeypot to generate the IOC for further discovery esp on evolved threats since signature and behavioral detection is not foolproof. Need to stop targeted attack and isolate fast to contain damage.

b) Early detection -  Beef up security baseline implemented at system/network/appl level, go beyond just IOC findings instead tap on the reinforced controls to alert you or OPS team instead. Tap on SIEMS to correlate rule to trigger on DLP, IRM, Anti-spam/phishing and Anti-Ransomware related to suspected events. This in a way also "discover" IOC.
0

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Liquid Web and Plesk discuss how to simplify server management with a single tool  in their webinar.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question