<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to detect APT (Advanced persistent threat) attack ? in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-detect-APT-Advanced-persistent-threat-attack/m-p/238883#M6685</link>
    <description>&lt;P&gt;Well, this is a very involved question that doesn't have a straightforward answer.  By definition an APT is a compromise of a network by means not detectable by signature based security software.  This means there really isn't a silver bullet to detect and APT.&lt;/P&gt;

&lt;P&gt;In my experience, the best way to discover an APT is through behavior modeling.  What i mean by this is simply you need to know what legitimate behavior to expect on your network so that you can investigate any deviations from that norm.  For example, if Mary's computer in accounting one day becomes an FTP server after years of just being a workstation then something may be awry. Splunk has a product to perform these functions already, but I believe there is a charge.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://www.splunk.com/en_us/products/premium-solutions/user-behavior-analytics.html"&gt;http://www.splunk.com/en_us/products/premium-solutions/user-behavior-analytics.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;There are other products that accomplish this same goal such as Observable Networks (&lt;A href="https://observable.net/"&gt;https://observable.net/&lt;/A&gt;) or you could attempt to devise your own system if you have the programming background.  You could create a splunk app of your own that maintains an endpoint profile based on MAC address, but it would be a good bit of work.&lt;/P&gt;</description>
    <pubDate>Wed, 18 Nov 2015 14:49:02 GMT</pubDate>
    <dc:creator>rmcdougal</dc:creator>
    <dc:date>2015-11-18T14:49:02Z</dc:date>
    <item>
      <title>How to detect APT (Advanced persistent threat) attack ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-detect-APT-Advanced-persistent-threat-attack/m-p/238882#M6684</link>
      <description>&lt;P&gt;How to detect APT (Advanced persistent threat) attack ?  &lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2015 10:55:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-detect-APT-Advanced-persistent-threat-attack/m-p/238882#M6684</guid>
      <dc:creator>Maheshparsi</dc:creator>
      <dc:date>2015-11-18T10:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect APT (Advanced persistent threat) attack ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-detect-APT-Advanced-persistent-threat-attack/m-p/238883#M6685</link>
      <description>&lt;P&gt;Well, this is a very involved question that doesn't have a straightforward answer.  By definition an APT is a compromise of a network by means not detectable by signature based security software.  This means there really isn't a silver bullet to detect and APT.&lt;/P&gt;

&lt;P&gt;In my experience, the best way to discover an APT is through behavior modeling.  What i mean by this is simply you need to know what legitimate behavior to expect on your network so that you can investigate any deviations from that norm.  For example, if Mary's computer in accounting one day becomes an FTP server after years of just being a workstation then something may be awry. Splunk has a product to perform these functions already, but I believe there is a charge.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://www.splunk.com/en_us/products/premium-solutions/user-behavior-analytics.html"&gt;http://www.splunk.com/en_us/products/premium-solutions/user-behavior-analytics.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;There are other products that accomplish this same goal such as Observable Networks (&lt;A href="https://observable.net/"&gt;https://observable.net/&lt;/A&gt;) or you could attempt to devise your own system if you have the programming background.  You could create a splunk app of your own that maintains an endpoint profile based on MAC address, but it would be a good bit of work.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2015 14:49:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-detect-APT-Advanced-persistent-threat-attack/m-p/238883#M6685</guid>
      <dc:creator>rmcdougal</dc:creator>
      <dc:date>2015-11-18T14:49:02Z</dc:date>
    </item>
  </channel>
</rss>

