Summary

In this chapter, we discussed unknown threat detection techniques involving identifying abnormalities in network traffic and host behaviors. To identify and visualize potential threats in network traffic, we introduced two open source tools—Malcom and Maltrail. Malcom helps connection relationship diagram and also potential C&C server connections.

As regards the host behaviors, we explained IOCs and discussed some abnormal host behaviors for potential threats. Different aspects of web access log analysis were also discussed, including an external source of client IP, client fingerprints, website reputation, DGAs, and DNS query.

We also suggested some open source frameworks for an organization that would like to build an in-house ...

Get Hands-On Security in DevOps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.