heroui logo

Unusual Linux Network Port Activity

Elastic Detection Rules

View Source
Summary
The 'Unusual Linux Network Port Activity' detection rule is designed to identify anomalous destination port usage in Linux environments, leveraging machine learning to flag potential command-and-control activity, unauthorized access, or data exfiltration. Given that rare destination port activity is atypical in Linux fleets, this rule seeks to detect unusual behaviors that may indicate intrusions or unauthorized operations. The rule checks for network communication on ports that are not commonly used, providing a threshold for anomaly detection and generating alerts when the thresholds are surpassed. False positives may occur from legitimate applications or network configurations but can be managed through proper tuning and investigation workflows. The integration of Elastic's machine learning capabilities, along with necessary prerequisites for the implementation, enhances monitoring effectiveness and response capabilities for incidents involving network security breaches. The rule requires associated machine learning jobs and data integrations using Elastic Defend or Auditd Manager, ensuring a comprehensive approach to endpoint security.
Categories
  • Endpoint
  • Linux
Data Sources
  • Network Traffic
  • Process
Created: 2020-03-25