
Summary
This rule monitors network activity on Linux systems to detect potential port knocking behavior, which is a method used by attackers to gain covert access by sending a specific sequence of packets to closed ports before opening access. The detection is triggered when the network event shows a sequence by host ID with a maximum span of 10 seconds where a process attempts to connect using non-standard ports, leading to a single packet connection (network flow). It accounts for common communication and command execution processes to help identify anomalous behavior indicative of reverse connections through port knocking. The rule targets Linux systems specifically and is indexed against logs from endpoint events and network traffic, with a primary focus on traffic signaling techniques of the MITRE ATT&CK framework, namely T1205 (Traffic Signaling) and its sub-technique T1205.001 (Port Knocking).
Categories
- Network
- Endpoint
- Linux
Data Sources
- Network Traffic
- Container
ATT&CK Techniques
- T1205
- T1205.001
- T1571
Created: 2023-10-24