
Summary
This detection rule is designed to identify situations where a single host generates a significantly high volume of intrusion events, specifically more than 15 Snort-based alerts within a 30-minute timeframe. It utilizes logs from Cisco Secure Firewall Threat Defense focusing on the event type IntrusionEvent to monitor potential suspicious activities. Such spikes could signify various malicious actions including malware execution, command-and-control activities, vulnerability scanning, or lateral movement. However, it may also be triggered by misconfigurations or outdated software, making a review of the host's context crucial before escalation. The rule leverages Splunk for log management and includes specific configurations to fine-tune detection capabilities while providing guidance on how to implement the necessary searches within Splunk environments.
Categories
- Network
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
ATT&CK Techniques
- T1059
- T1071
- T1595.002
Created: 2025-04-14